Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1778: CWE-295 Improper Certificate Validation in AWS SageMaker Python SDK

0
Medium
VulnerabilityCVE-2026-1778cvecve-2026-1778cwe-295
Published: Mon Feb 02 2026 (02/02/2026, 20:14:57 UTC)
Source: CVE Database V5
Vendor/Project: AWS
Product: SageMaker Python SDK

Description

Amazon SageMaker Python SDK before v3.1.1 or v2.256.0 disables TLS certificate verification for HTTPS connections made by the service when a Triton Python model is imported, incorrectly allowing for requests with invalid and self-signed certificates to succeed.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/10/2026, 10:49:27 UTC

Technical Analysis

CVE-2026-1778 identifies a security vulnerability in the AWS SageMaker Python SDK versions before v3.1.1 or v2.256.0, specifically related to improper TLS certificate validation (CWE-295). When a Triton Python model is imported, the SDK disables TLS certificate verification for HTTPS connections, allowing connections to succeed even if the server presents invalid or self-signed certificates. This flaw undermines the trust model of TLS, enabling man-in-the-middle (MitM) attacks where an adversary can intercept, alter, or spoof communications between the client and the server. The vulnerability does not impact confidentiality directly but compromises the integrity of data and models transmitted, potentially allowing attackers to inject malicious payloads or manipulate model behavior. The CVSS 3.1 score is 5.9 (medium severity), reflecting network attack vector (AV:N), high attack complexity (AC:H), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), no confidentiality impact (C:N), high integrity impact (I:H), and no availability impact (A:N). No known exploits have been reported yet, but the vulnerability poses a risk especially in environments where TLS validation is critical for secure model deployment and data exchange. The issue is rooted in the SDK's handling of HTTPS connections when importing Triton models, a common use case in AI/ML workflows on AWS. The lack of patch links suggests that users should upgrade to the specified fixed versions or later to remediate the issue.

Potential Impact

For European organizations leveraging AWS SageMaker for machine learning, this vulnerability can lead to significant risks. Attackers positioned on the network path could exploit the disabled certificate validation to perform MitM attacks, injecting malicious code or altering model data during import processes. This can compromise the integrity of AI models, leading to incorrect predictions or decisions, which is critical in sectors like finance, healthcare, and critical infrastructure. Although confidentiality is not directly impacted, the integrity breach can cause cascading effects on business operations and compliance with data protection regulations such as GDPR. The medium severity reflects the high complexity of exploitation, but organizations with sensitive AI workloads or those operating in regulated industries should prioritize remediation. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as adversaries may develop exploits over time. Additionally, the vulnerability could undermine trust in AI systems and cloud services if exploited, affecting organizational reputation and operational reliability.

Mitigation Recommendations

To mitigate CVE-2026-1778, European organizations should immediately upgrade the AWS SageMaker Python SDK to version 3.1.1, 2.256.0, or later, where the TLS certificate validation issue is resolved. Review and enforce strict TLS certificate validation policies in all custom SDK configurations and scripts, ensuring that no insecure flags or options disable verification. Conduct network monitoring to detect unusual HTTPS traffic patterns or potential MitM attempts during model import operations. Implement network segmentation and use private endpoints or VPNs for AWS SageMaker access to reduce exposure to network-based attacks. Regularly audit and update dependencies and SDK versions in AI/ML pipelines to prevent similar vulnerabilities. Educate development and security teams about the risks of disabling TLS verification and the importance of secure model deployment practices. Finally, maintain an incident response plan that includes scenarios involving AI model integrity compromise.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
AMZN
Date Reserved
2026-02-02T18:14:03.282Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69813004f9fa50a62f63a39a

Added to database: 2/2/2026, 11:15:16 PM

Last enriched: 2/10/2026, 10:49:27 AM

Last updated: 3/25/2026, 6:02:14 AM

Views: 45

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses