Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-62rc-f4v9-h543 | SageMaker Python SDK has Insecure TLS Configuration |
Wed, 04 Feb 2026 12:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Amazon
Amazon sagemaker Python Sdk |
|
| Vendors & Products |
Amazon
Amazon sagemaker Python Sdk |
Tue, 03 Feb 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 03 Feb 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 02 Feb 2026 23:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Amazon SageMaker Python SDK before v3.1.1 or v2.256.0 disables TLS certificate verification for HTTPS connections made by the service when a Triton Python model is imported, incorrectly allowing for requests with invalid and self-signed certificates to succeed. | |
| Title | TLS disabled by default in select aws/sagemaker-python-sdk configurations | |
| Weaknesses | CWE-295 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: AMZN
Published:
Updated: 2026-02-04T16:28:33.193Z
Reserved: 2026-02-02T18:14:03.282Z
Link: CVE-2026-1778
Updated: 2026-02-03T15:02:26.866Z
Status : Deferred
Published: 2026-02-02T23:16:04.283
Modified: 2026-04-15T00:35:42.020
Link: CVE-2026-1778
No data.
OpenCVE Enrichment
Updated: 2026-04-18T00:45:32Z
Github GHSA