<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Hmac — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/hmac/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 21 May 2026 17:44:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/hmac/feed.xml" rel="self" type="application/rss+xml"/><item><title>Amazon SageMaker Python SDK HMAC Key Leakage via API Exposure</title><link>https://feed.craftedsignal.io/briefs/2026-05-sagemaker-hmac-leak/</link><pubDate>Thu, 21 May 2026 17:44:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-sagemaker-hmac-leak/</guid><description>Amazon SageMaker Python SDK exposes an HMAC signing key in cleartext via API calls, enabling a remote authenticated actor to forge model artifacts and achieve code execution.</description><content:encoded><![CDATA[<p>The Amazon SageMaker Python SDK, a library for training and deploying machine learning models on Amazon SageMaker, contains a vulnerability related to the ModelBuilder/Serve component. Specifically, when building and deploying models with affected model servers (TorchServe, Multi-Model Server, TensorFlow Serving, SMD, or Triton), the SDK inadvertently stores an HMAC secret key in cleartext as the <code>SAGEMAKER_SERVE_SECRET_KEY</code> environment variable within the SageMaker model container configuration. This sensitive environment variable is then exposed in plaintext through the <code>DescribeModel</code>, <code>DescribeEndpointConfig</code>, and <code>DescribeModelPackage</code> APIs. This vulnerability affects versions &gt;= v2.199.0 AND &lt;= v2.257.1, as well as versions &gt;= v3.0.0 AND &lt;= v3.7.1. Defenders must upgrade to the patched versions and rebuild models to remediate the risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains authenticated access to the AWS environment.</li>
<li>Attacker enumerates SageMaker models via <code>DescribeModel</code>, <code>DescribeEndpointConfig</code>, or <code>DescribeModelPackage</code> API calls.</li>
<li>The API response reveals the <code>SAGEMAKER_SERVE_SECRET_KEY</code> in plaintext within the container environment configuration.</li>
<li>Attacker gains S3 write access to the model artifact path.</li>
<li>Attacker crafts a malicious model artifact, forging a valid integrity signature using the leaked HMAC key.</li>
<li>Attacker uploads the forged model artifact to the S3 bucket, replacing the original model.</li>
<li>The compromised model is deployed to an inference container.</li>
<li>Upon execution, the malicious model executes code within the SageMaker execution role&rsquo;s IAM permissions, leading to potential privilege escalation.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker with authenticated access and S3 write permissions to achieve code execution within SageMaker inference containers. The attacker can leverage the SageMaker execution role&rsquo;s IAM permissions, potentially leading to privilege escalation, data exfiltration, or other malicious activities. The number of affected SageMaker models is dependent on the number of organizations using ModelBuilder with vulnerable SDK versions to create and deploy models. If this attack succeeds, it allows attackers to take complete control over SageMaker machine learning models.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Amazon SageMaker Python SDK to versions v2.257.2 or v3.8.0 or later to address the vulnerability as stated in the advisory.</li>
<li>Rebuild any models previously created with ModelBuilder using the updated SDK to ensure the sensitive HMAC key is not stored in the container environment variables.</li>
<li>Monitor AWS CloudTrail logs for API calls to <code>DescribeModel</code>, <code>DescribeEndpointConfig</code>, and <code>DescribeModelPackage</code> to detect potential enumeration attempts by attackers.</li>
<li>Implement strict IAM policies to limit access to the <code>DescribeModel</code>, <code>DescribeEndpointConfig</code>, and <code>DescribeModelPackage</code> APIs and S3 write access to model artifact paths.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sagemaker</category><category>hmac</category><category>key-leakage</category><category>cloud</category><category>privilege-escalation</category></item></channel></rss>