Due to the usage of vulnerable third party component in SAP Wily Introscope Enterprise Manager (WorkStation), an unauthenticated attacker could create a malicious JNLP (Java Network Launch Protocol) file accessible by a public facing URL. When a victim clicks on the URL the accessed Wily Introscope Server could execute OS commands on the victim's machine. This could completely compromising confidentiality, integrity and availability of the system.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 13 Jan 2026 01:45:00 +0000

Type Values Removed Values Added
Description Due to the usage of vulnerable third party component in SAP Wily Introscope Enterprise Manager (WorkStation), an unauthenticated attacker could create a malicious JNLP (Java Network Launch Protocol) file accessible by a public facing URL. When a victim clicks on the URL the accessed Wily Introscope Server could execute OS commands on the victim's machine. This could completely compromising confidentiality, integrity and availability of the system.
Title Remote code execution in SAP Wily Introscope Enterprise Manager (WorkStation)
Weaknesses CWE-94
References
Metrics cvssV3_1

{'score': 9.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: sap

Published:

Updated: 2026-01-13T01:13:57.659Z

Reserved: 2025-12-09T22:06:41.322Z

Link: CVE-2026-0500

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-01-13T02:15:52.633

Modified: 2026-01-13T02:15:52.633

Link: CVE-2026-0500

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses