Cyber Posture

CVE-2026-1777

High

Published: 02 February 2026

Published
02 February 2026
Modified
15 April 2026
KEV Added
Patch
CVSS Score 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0002 5.2th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-1777 is a high-severity Cleartext Transmission of Sensitive Information (CWE-319) vulnerability in Amazon SageMaker Python (inferred from references). Its CVSS base score is 7.2 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Unsecured Credentials (T1552); ranked at the 5.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

Threat & Defense at a Glance

What attackers do: exploitation maps to Unsecured Credentials (T1552) and 2 other techniques.
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-319

Role-based training covers secure transmission methods, mitigating cleartext transmission of sensitive data.

addresses: CWE-319

By requiring documented security controls for information exchanges, the control reduces the risk of cleartext transmission of sensitive data.

addresses: CWE-319

Mapping transmission actions in data flows helps prevent cleartext transmission of sensitive information.

addresses: CWE-319

Settings can enforce secure transmission protocols to prevent cleartext transmission of sensitive data.

addresses: CWE-319

Policy addresses secure transport and handling of media to avoid cleartext transmission of sensitive information.

addresses: CWE-319

Enforces safeguards against cleartext transmission of CUI when data leaves organizational boundaries to external systems.

addresses: CWE-319

Explicit controls and continuous oversight on external system services prevent cleartext transmission of sensitive information over provider-managed channels.

addresses: CWE-319

Key-establishment procedures specify secure distribution channels that preclude cleartext transmission of key material.

MITRE ATT&CK Enterprise TechniquesAI

T1552 Unsecured Credentials Credential Access
Adversaries may search compromised systems to find and obtain insecurely stored credentials.
T1565.001 Stored Data Manipulation Impact
Adversaries may insert, delete, or manipulate data at rest in order to influence external outcomes or hide activity, thus threatening the integrity of the data.
T1105 Ingress Tool Transfer Command And Control
Adversaries may transfer tools or other files from an external system into a compromised environment.
Why these techniques?

HMAC key exposure directly matches T1552 (Unsecured Credentials); attacker use of key to upload/poison S3 artifacts matches T1565.001 (Stored Data Manipulation) and T1105 (Ingress Tool Transfer) leading to automatic execution in training jobs.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

The Amazon SageMaker Python SDK before v3.2.0 and v2.256.0 includes the ModelBuilder HMAC signing key in the cleartext response elements of the DescribeTrainingJob function. A third party with permissions to both call this API and permissions to modify objects in…

more

the Training Jobs S3 output location may have the ability to upload arbitrary artifacts which are executed the next time the Training Job is invoked.

Deeper analysisAI

CVE-2026-1777 is a vulnerability in the Amazon SageMaker Python SDK versions prior to v3.2.0 and v2.256.0, where the ModelBuilder HMAC signing key is exposed in cleartext within the response elements of the DescribeTrainingJob function. This issue, classified under CWE-319 (Cleartext Storage of Sensitive Information), carries a CVSS v3.1 base score of 7.2 (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H), indicating high impact on confidentiality, integrity, and availability.

Exploitation requires a third party with permissions to invoke the DescribeTrainingJob API and to modify objects in the associated Training Jobs S3 output location. Such an attacker can capture the exposed HMAC key and use it to upload arbitrary artifacts to the S3 bucket, which are then executed automatically upon the next invocation of the Training Job.

AWS security bulletin 2026-004 and the associated GitHub security advisory (GHSA-rjrp-m2jw-pv9c) recommend upgrading to Amazon SageMaker Python SDK v3.2.0 or v2.256.0 as the primary mitigation. Release notes for these versions on GitHub confirm the fixes addressing the cleartext key exposure.

This vulnerability is particularly relevant to AI/ML workflows in AWS SageMaker, where compromised training jobs could lead to arbitrary code execution in machine learning pipelines.

Details

CWE(s)

Affected Products

Amazon
SageMaker Python
inferred from references and description; NVD did not file a CPE for this CVE

CVEs Like This One

CVE-2025-58107Shared CWE-319
CVE-2024-43187Shared CWE-319
CVE-2026-32309Shared CWE-319
CVE-2025-70048Shared CWE-319
CVE-2025-0556Shared CWE-319
CVE-2026-24455Shared CWE-319
CVE-2025-27594Shared CWE-319
CVE-2020-36914Shared CWE-319
CVE-2024-26155Shared CWE-319
CVE-2026-30795Shared CWE-319

References