Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2026-8597
PUBLISHED
More InfoOfficial Page
Assigner-AMZN
Assigner Org ID-ff89ba41-3aa1-4d27-914a-91399e9639e5
View Known Exploited Vulnerability (KEV) details
Published At-14 May, 2026 | 19:37
Updated At-16 May, 2026 | 03:56
Rejected At-
▼CVE Numbering Authority (CNA)
Missing integrity verification in Triton inference handler in Amazon SageMaker Python SDK

Missing integrity verification in the Triton inference handler in Amazon SageMaker Python SDK v2 before v2.257.2 and v3 before v3.8.0 might allow a remote authenticated actor to achieve code execution in inference containers via replacement of model artifacts in S3 with a specially crafted pickle payload that is deserialized without verification. This issue requires a remote authenticated actor with S3 write access to the model artifact path. To remediate this issue, we recommend upgrading to Amazon SageMaker Python SDK v2.257.2 or v3.8.0 and rebuild any Triton models previously created with ModelBuilder using the updated SDK.

Affected Products
Vendor
Amazon SageMaker Python SDK
Product
AWS
Default Status
unaffected
Versions
Affected
  • From 2.199.0 through 2.257.1 (custom)
  • From 3.0.0 through 3.7.1 (custom)
Problem Types
TypeCWE IDDescription
CWECWE-354CWE-354 Improper validation of integrity check value
Type: CWE
CWE ID: CWE-354
Description: CWE-354 Improper validation of integrity check value
Metrics
VersionBase scoreBase severityVector
3.17.2HIGH
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
4.06.4MEDIUM
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H
Version: 3.1
Base score: 7.2
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Version: 4.0
Base score: 6.4
Base severity: MEDIUM
Vector:
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H
Metrics Other Info
Impacts
CAPEC IDDescription
CAPEC-586CAPEC-586 Object Injection
CAPEC ID: CAPEC-586
Description: CAPEC-586 Object Injection
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://github.com/aws/sagemaker-python-sdk/releases/tag/v2.257.2
patch
https://github.com/aws/sagemaker-python-sdk/releases/tag/v3.8.0
patch
https://aws.amazon.com/security/security-bulletins/2026-031-aws/
vendor-advisory
https://github.com/aws/sagemaker-python-sdk/security/advisories/GHSA-rq6v-x3j8-7qgf
third-party-advisory
Hyperlink: https://github.com/aws/sagemaker-python-sdk/releases/tag/v2.257.2
Resource:
patch
Hyperlink: https://github.com/aws/sagemaker-python-sdk/releases/tag/v3.8.0
Resource:
patch
Hyperlink: https://aws.amazon.com/security/security-bulletins/2026-031-aws/
Resource:
vendor-advisory
Hyperlink: https://github.com/aws/sagemaker-python-sdk/security/advisories/GHSA-rq6v-x3j8-7qgf
Resource:
third-party-advisory
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Details not found