Due to the usage of vulnerable third party component in SAP Wily Introscope Enterprise Manager (WorkStation), an unauthenticated attacker could create a malicious JNLP (Java Network Launch Protocol) file accessible by a public facing URL. When a victim clicks on the URL the accessed Wily Introscope Server could execute OS commands on the victim's machine. This could completely compromising confidentiality, integrity and availability of the system.
Metrics
Affected Vendors & Products
References
History
Tue, 13 Jan 2026 01:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Due to the usage of vulnerable third party component in SAP Wily Introscope Enterprise Manager (WorkStation), an unauthenticated attacker could create a malicious JNLP (Java Network Launch Protocol) file accessible by a public facing URL. When a victim clicks on the URL the accessed Wily Introscope Server could execute OS commands on the victim's machine. This could completely compromising confidentiality, integrity and availability of the system. | |
| Title | Remote code execution in SAP Wily Introscope Enterprise Manager (WorkStation) | |
| Weaknesses | CWE-94 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: sap
Published:
Updated: 2026-01-13T01:13:57.659Z
Reserved: 2025-12-09T22:06:41.322Z
Link: CVE-2026-0500
No data.
Status : Received
Published: 2026-01-13T02:15:52.633
Modified: 2026-01-13T02:15:52.633
Link: CVE-2026-0500
No data.
OpenCVE Enrichment
No data.