Mend.io Vulnerability Database
The largest open source vulnerability database
What is a Vulnerability ID?
New vulnerability? Tell us about it!
CVE-2026-8597
Published:May 14, 2026
Updated:May 18, 2026
Missing integrity verification in the Triton inference handler in Amazon SageMaker Python SDK v2 before v2.257.2 and v3 before v3.8.0 might allow a remote authenticated actor to achieve code execution in inference containers via replacement of model artifacts in S3 with a specially crafted pickle payload that is deserialized without verification. This issue requires a remote authenticated actor with S3 write access to the model artifact path. To remediate this issue, we recommend upgrading to Amazon SageMaker Python SDK v2.257.2 or v3.8.0 and rebuild any Triton models previously created with ModelBuilder using the updated SDK.
Affected Packages
sagemaker (CONDA):
Affected version(s) >=3.5.0 <3.8.0
Fix Suggestion:
Update to version 3.8.0
sagemaker (CONDA):
Affected version(s) =2.245.0 <2.257.2
Fix Suggestion:
Update to version 2.257.2
sagemaker (PYTHON):
Affected version(s) >=2.199.0 <2.257.2
Fix Suggestion:
Update to version 2.257.2
sagemaker (PYTHON):
Affected version(s) >=3.0 <3.8.0
Fix Suggestion:
Update to version 3.8.0
Do you need more information?
Contact Us
CVSS v4
Base Score:
6.4
Attack Vector
NETWORK
Attack Complexity
LOW
Attack Requirements
NONE
Privileges Required
HIGH
User Interaction
NONE
Vulnerable System Confidentiality
NONE
Vulnerable System Integrity
NONE
Vulnerable System Availability
NONE
Subsequent System Confidentiality
HIGH
Subsequent System Integrity
HIGH
Subsequent System Availability
HIGH
CVSS v3
Base Score:
7.2
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH
Weakness Type (CWE)
Improper Validation of Integrity Check Value
EPSS
Base Score:
0.10