Description
Insecure deserialization in the job results processing component in Amazon Braket SDK before 1.117.0 might allow a remote authenticated user with S3 write access to the job output bucket to achieve arbitrary code execution on any machine that processes job results.



We recommend you upgrade to amazon-braket-sdk version 1.117.0 or later.
Published: 2026-05-22
Score: 7.5 High
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Insecure deserialization in the Amazon Braket SDK job results processing component can allow a remote authenticated user who has S3 write access to the job output bucket to execute arbitrary code on any system that processes those results. The flaw is a classic deserialization weakness (CWE‑502) that compromises confidentiality, integrity, and availability by enabling code execution without further interaction with the SDK consumer. The vulnerability is limited to machines that consume job results and would not affect users who never read or process these outputs on local infrastructure.

Affected Systems

The affected product is the AWS Amazon Braket Python SDK, specifically any deployment using a version prior to 1.117.0. The SDK itself is identified by the CNA vendor product list and the CPE string, and any installation of this SDK that processes job results from S3 output buckets is impacted.

Risk and Exploitability

The CVSS score of 7.5 marks this flaw as high severity. Because the EPSS score is not available, the exact likelihood of exploitation is unknown, and the vulnerability is not listed in CISA’s KEV catalog, there is no evidence of widespread exploitation yet. The attack vector is remote but requires an authenticated session with permission to write to the job output bucket; once that permission is granted, an attacker can achieve code execution on systems that read and process the stored job results. No additional privileges are required beyond the S3 write access, making the requirement terminal for the exploit.

Generated by OpenCVE AI on May 22, 2026 at 19:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Amazon Braket SDK to version 1.117.0 or later as the vendor has released a patch
  • Limit the S3 job‑output bucket write permissions to only authorized accounts and enforce the principle of least privilege to prevent untrusted users from uploading malicious payloads
  • Validate and sandbox job result content before deserialization on any system that processes the results to mitigate the effect of malicious data

Generated by OpenCVE AI on May 22, 2026 at 19:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 22 May 2026 19:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 22 May 2026 18:45:00 +0000

Type Values Removed Values Added
Description Insecure deserialization in the job results processing component in Amazon Braket SDK before 1.117.0 might allow a remote authenticated user with S3 write access to the job output bucket to achieve arbitrary code execution on any machine that processes job results. We recommend you upgrade to amazon-braket-sdk version 1.117.0 or later.
Title Insecure Deserialization in Amazon Braket SDK Job Results Processing
First Time appeared Aws
Aws amazon Braket Python Sdk
Weaknesses CWE-502
CPEs cpe:2.3:a:aws:amazon_braket_python_sdk:*:*:*:*:*:*:*:*
Vendors & Products Aws
Aws amazon Braket Python Sdk
References
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 7.5, 'vector': 'CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Aws Amazon Braket Python Sdk
cve-icon MITRE

Status: PUBLISHED

Assigner: AMZN

Published:

Updated: 2026-05-22T19:03:41.903Z

Reserved: 2026-05-22T17:08:22.626Z

Link: CVE-2026-9291

cve-icon Vulnrichment

Updated: 2026-05-22T19:03:36.812Z

cve-icon NVD

No data.

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-22T20:00:13Z

Weaknesses