Due to the usage of vulnerable third party component in SAP Wily Introscope Enterprise Manager (WorkStation), an unauthenticated attacker could create a malicious JNLP (Java Network Launch Protocol) file accessible by a public facing URL. When a victim clicks on the URL the accessed Wily Introscope Server could execute OS commands on the victim's machine. This could completely compromising confidentiality, integrity and availability of the system.
History

Tue, 13 Jan 2026 01:45:00 +0000

Type Values Removed Values Added
Description Due to the usage of vulnerable third party component in SAP Wily Introscope Enterprise Manager (WorkStation), an unauthenticated attacker could create a malicious JNLP (Java Network Launch Protocol) file accessible by a public facing URL. When a victim clicks on the URL the accessed Wily Introscope Server could execute OS commands on the victim's machine. This could completely compromising confidentiality, integrity and availability of the system.
Title Remote code execution in SAP Wily Introscope Enterprise Manager (WorkStation)
Weaknesses CWE-94
References
Metrics cvssV3_1

{'score': 9.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: sap

Published:

Updated: 2026-01-13T01:13:57.659Z

Reserved: 2025-12-09T22:06:41.322Z

Link: CVE-2026-0500

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-01-13T02:15:52.633

Modified: 2026-01-13T02:15:52.633

Link: CVE-2026-0500

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.