Impact
A vulnerable third‑party component in SAP Wily Introscope Enterprise Manager enables any unauthenticated user to host a malicious JNLP file behind a public URL. When a victim opens that URL the server executes arbitrary OS commands on the client machine, effectively compromising confidentiality, integrity, and availability. The flaw is a classic code injection (CWE-94).
Affected Systems
SAP Wily Introscope Enterprise Manager (WorkStation) version 10.8 from vendor SAP is affected.
Risk and Exploitability
The CVSS score of 9.6 indicates critical severity, yet the EPSS score is under 1 %, suggesting low current exploitation probability. The vulnerability is not listed in CISA’s KEV catalog. An attacker only needs to host the JNLP file on a publicly reachable URL and persuade a user to click it; no authentication or privileged access is required.
OpenCVE Enrichment