To remediate this issue, we recommend upgrading to Amazon SageMaker Python SDK v2.257.2 or v3.8.0 and rebuild any models previously created with ModelBuilder using the updated SDK.
Project Subscriptions
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-7hh5-prp2-mfh5 | Cleartext storage of HMAC signing key in Amazon SageMaker Python SDK ModelBuilder/Serve path |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Sun, 17 May 2026 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Amazon
Amazon sagemaker Python Sdk |
|
| Vendors & Products |
Amazon
Amazon sagemaker Python Sdk |
Fri, 15 May 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 14 May 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Cleartext storage of sensitive information in the ModelBuilder/Serve component in Amazon SageMaker Python SDK before v2.257.2 and v3 before v3.8.0 might allow a remote authenticated actor to extract the HMAC signing key from SageMaker API responses and forge valid integrity signatures for specially crafted model artifacts, achieving code execution in inference containers. This issue requires a remote authenticated actor with permissions to call SageMaker describe APIs and S3 write access to the model artifact path. To remediate this issue, we recommend upgrading to Amazon SageMaker Python SDK v2.257.2 or v3.8.0 and rebuild any models previously created with ModelBuilder using the updated SDK. | |
| Title | Cleartext storage of HMAC signing key in Amazon SageMaker Python SDK ModelBuilder/Serve path | |
| First Time appeared |
Amazon Sagemaker Python Sdk
Amazon Sagemaker Python Sdk aws |
|
| Weaknesses | CWE-312 | |
| CPEs | cpe:2.3:a:amazon_sagemaker_python_sdk:aws:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Amazon Sagemaker Python Sdk
Amazon Sagemaker Python Sdk aws |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: AMZN
Published:
Updated: 2026-05-16T03:56:21.927Z
Reserved: 2026-05-14T13:39:22.096Z
Link: CVE-2026-8596
Updated: 2026-05-15T13:30:32.491Z
Status : Awaiting Analysis
Published: 2026-05-14T20:17:21.183
Modified: 2026-05-15T14:10:17.083
Link: CVE-2026-8596
No data.
OpenCVE Enrichment
Updated: 2026-05-17T19:30:08Z
Github GHSA