HomeIntelligenceBrief
🛡️ VULNERABILITY BRIEF🟠 High🛡️ Vulnerability

AI Sandbox Flaws in Amazon Bedrock, LangSmith, and SGLang Enable Data Exfiltration and Remote Code Execution

BeyondTrust researchers uncovered that Amazon Bedrock’s Agent Core Code Interpreter, along with LangSmith and SGLang, allow outbound DNS queries from their sandbox environments. This flaw can be leveraged for covert data exfiltration and remote code execution, posing a high‑risk vector for any organization using these AI services.

🛡️ LiveThreat™ Intelligence · 📅 March 17, 2026· 📰 thehackernews.com
🟠
Severity
High
🛡️
Type
Vulnerability
🎯
Confidence
High
🏢
Affected
2 sector(s)
Actions
4 recommended
📰
Source
thehackernews.com

AI Sandbox Flaws in Amazon Bedrock, LangSmith, and SGLang Enable Data Exfiltration and Remote Code Execution

What Happened – Researchers from BeyondTrust discovered that the sandbox mode of Amazon Bedrock’s Agent Core Code Interpreter, as well as LangSmith and SGLang runtimes, allow outbound DNS queries. An attacker can abuse these queries to exfiltrate data and obtain an interactive shell, effectively achieving remote code execution (RCE).

Why It Matters for TPRM

  • Cloud‑based AI services are increasingly embedded in third‑party applications, expanding the attack surface.
  • DNS‑based exfiltration bypasses many traditional egress controls, exposing sensitive data to external actors.
  • RCE in a shared AI execution environment can compromise downstream workloads and downstream customers.

Who Is Affected – SaaS providers, enterprise developers, and any organization that integrates Amazon Bedrock, LangSmith, or SGLang into their products or internal workflows.

Recommended Actions – Review contracts and security clauses for AI‑as‑a‑Service (AIaaS) providers, enforce strict egress filtering for DNS, request evidence of sandbox hardening, and consider alternative AI runtimes until patches are verified.

Technical Notes – The vulnerability stems from a mis‑configured sandbox that permits unrestricted outbound DNS traffic, enabling a covert channel for data exfiltration and interactive shell access. No specific CVE has been assigned yet; the issue is disclosed as a zero‑day exploit. Source: The Hacker News

📰 Original Source
https://thehackernews.com/2026/03/ai-flaws-in-amazon-bedrock-langsmith.html

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

🛡️

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.