Description
Amazon SageMaker Python SDK before v3.1.1 or v2.256.0 disables TLS certificate verification for HTTPS connections made by the service when a Triton Python model is imported, incorrectly allowing for requests with invalid and self-signed certificates to succeed.
Published: 2026-02-02
Score: 8.2 High
EPSS: < 1% Very Low
KEV: No
Impact: TLS certificate verification bypass leading to man‑in‑the‑middle risk
Action: Patch
AI Analysis

Impact

This vulnerability arises when the SageMaker Python SDK disables TLS certificate verification for HTTPS connections made by the service during a Triton Python model import. As a result, requests with invalid or self‑signed certificates are accepted, allowing an attacker to perform man‑in‑the‑middle attacks or tamper with the data exchanged with the model server. The weakness is categorized as CWE‑295, which represents integrity and confidentiality compromise due to improper validation of certificate trust anchors.

Affected Systems

Amazon SageMaker Python SDK is affected, specifically any release prior to version 3.1.1 or prior to 2.256.0. These older SDKs fail to enforce TLS certificate verification when importing Triton Python models, creating the conditions for abuse. No other AWS or SageMaker components are mentioned as affected by the CNAs.

Risk and Exploitability

The CVSS v3.1 base score is 8.2, indicating high severity, but the EPSS score is below 1%, suggesting low current exploitation likelihood. The vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog. An attacker would need to supply a model import request over HTTPS that uses a self‑signed or otherwise untrusted certificate; the SDK would accept it, and the attacker could then intercept, alter, or inject data in the model's input and output streams.

Generated by OpenCVE AI on April 18, 2026 at 00:33 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Amazon SageMaker Python SDK to version 3.1.1 or v2.256.0 or later, ensuring TLS verification is restored.
  • If an immediate upgrade is not possible, configure network controls to block unverified HTTPS traffic to Triton Python model servers or enforce certificate pinning in your environment.
  • Verify that any externally hosted Triton servers use valid, trusted certificates, and do not rely upon self‑signed certificates during integration.

Generated by OpenCVE AI on April 18, 2026 at 00:33 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-62rc-f4v9-h543 SageMaker Python SDK has Insecure TLS Configuration
History

Wed, 04 Feb 2026 12:30:00 +0000

Type Values Removed Values Added
First Time appeared Amazon
Amazon sagemaker Python Sdk
Vendors & Products Amazon
Amazon sagemaker Python Sdk

Tue, 03 Feb 2026 15:30:00 +0000


Tue, 03 Feb 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 02 Feb 2026 23:15:00 +0000

Type Values Removed Values Added
Description Amazon SageMaker Python SDK before v3.1.1 or v2.256.0 disables TLS certificate verification for HTTPS connections made by the service when a Triton Python model is imported, incorrectly allowing for requests with invalid and self-signed certificates to succeed.
Title TLS disabled by default in select aws/sagemaker-python-sdk configurations
Weaknesses CWE-295
References
Metrics cvssV3_1

{'score': 5.9, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N'}

cvssV4_0

{'score': 8.2, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Amazon Sagemaker Python Sdk
cve-icon MITRE

Status: PUBLISHED

Assigner: AMZN

Published:

Updated: 2026-02-04T16:28:33.193Z

Reserved: 2026-02-02T18:14:03.282Z

Link: CVE-2026-1778

cve-icon Vulnrichment

Updated: 2026-02-03T15:02:26.866Z

cve-icon NVD

Status : Deferred

Published: 2026-02-02T23:16:04.283

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-1778

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T00:45:32Z

Weaknesses