Due to the usage of vulnerable third party component in SAP Wily Introscope Enterprise Manager (WorkStation), an unauthenticated attacker could create a malicious JNLP (Java Network Launch Protocol) file accessible by a public facing URL. When a victim clicks on the URL the accessed Wily Introscope Server could execute OS commands on the victim's machine. This could completely compromising confidentiality, integrity and availability of the system.
Metrics
Affected Vendors & Products
References
History
Tue, 13 Jan 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 13 Jan 2026 09:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Sap
Sap introscope Enterprise Manager |
|
| Vendors & Products |
Sap
Sap introscope Enterprise Manager |
Tue, 13 Jan 2026 01:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Due to the usage of vulnerable third party component in SAP Wily Introscope Enterprise Manager (WorkStation), an unauthenticated attacker could create a malicious JNLP (Java Network Launch Protocol) file accessible by a public facing URL. When a victim clicks on the URL the accessed Wily Introscope Server could execute OS commands on the victim's machine. This could completely compromising confidentiality, integrity and availability of the system. | |
| Title | Remote code execution in SAP Wily Introscope Enterprise Manager (WorkStation) | |
| Weaknesses | CWE-94 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: sap
Published:
Updated: 2026-01-13T14:45:07.723Z
Reserved: 2025-12-09T22:06:41.322Z
Link: CVE-2026-0500
Updated: 2026-01-13T14:45:04.536Z
Status : Awaiting Analysis
Published: 2026-01-13T02:15:52.633
Modified: 2026-01-13T14:03:18.990
Link: CVE-2026-0500
No data.
OpenCVE Enrichment
Updated: 2026-01-13T09:26:56Z