Due to the usage of vulnerable third party component in SAP Wily Introscope Enterprise Manager (WorkStation), an unauthenticated attacker could create a malicious JNLP (Java Network Launch Protocol) file accessible by a public facing URL. When a victim clicks on the URL the accessed Wily Introscope Server could execute OS commands on the victim's machine. This could completely compromising confidentiality, integrity and availability of the system.
History

Tue, 13 Jan 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 13 Jan 2026 09:30:00 +0000

Type Values Removed Values Added
First Time appeared Sap
Sap introscope Enterprise Manager
Vendors & Products Sap
Sap introscope Enterprise Manager

Tue, 13 Jan 2026 01:45:00 +0000

Type Values Removed Values Added
Description Due to the usage of vulnerable third party component in SAP Wily Introscope Enterprise Manager (WorkStation), an unauthenticated attacker could create a malicious JNLP (Java Network Launch Protocol) file accessible by a public facing URL. When a victim clicks on the URL the accessed Wily Introscope Server could execute OS commands on the victim's machine. This could completely compromising confidentiality, integrity and availability of the system.
Title Remote code execution in SAP Wily Introscope Enterprise Manager (WorkStation)
Weaknesses CWE-94
References
Metrics cvssV3_1

{'score': 9.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: sap

Published:

Updated: 2026-01-13T14:45:07.723Z

Reserved: 2025-12-09T22:06:41.322Z

Link: CVE-2026-0500

cve-icon Vulnrichment

Updated: 2026-01-13T14:45:04.536Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-01-13T02:15:52.633

Modified: 2026-01-13T14:03:18.990

Link: CVE-2026-0500

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-01-13T09:26:56Z