{"id":"CVE-2021-33669","details":"Under certain conditions, SAP Mobile SDK Certificate Provider allows a local unprivileged attacker to exploit an insecure temporary file storage. For a successful exploitation user interaction from another user is required and could lead to complete impact of confidentiality integrity and availability.","modified":"2026-03-13T22:14:06.546373Z","published":"2021-06-09T14:15:10.137Z","related":["GHSA-r2j9-h6q9-cq8g"],"references":[{"type":"FIX","url":"https://github.com/SAP/mobilesdk-certificateprovider/security/advisories/GHSA-r2j9-h6q9-cq8g"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/sap/mobilesdk-certificateprovider","events":[{"introduced":"0"},{"fixed":"3915f524ac5edf3c0645c176190d12d5a4954503"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"3.0.8"}]}}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-33669.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}