The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2021-42694

CVE-2021-42694: Unicode Homoglyph Security Vulnerability

CVE-2021-42694 is a homoglyph security flaw in Unicode Specification that allows attackers to create visually identical but distinct identifiers to inject malicious code. This article covers technical details, impact, and mitigation.

Published: March 4, 2026

CVE-2021-42694 Overview

CVE-2021-42694 is a vulnerability discovered in the character definitions of the Unicode Specification through version 14.0. The specification allows an adversary to produce source code identifiers such as function names using homoglyphs that render visually identical to a target identifier. Adversaries can leverage this to inject code via adversarial identifier definitions in upstream software dependencies that are invoked deceptively in downstream software.

This vulnerability, part of the broader "Trojan Source" class of attacks, exploits the fundamental nature of international text support to enable supply chain attacks where malicious code can be hidden in plain sight within source code repositories.

Critical Impact

Attackers can inject malicious code into software projects using visually identical but semantically different Unicode characters, enabling supply chain attacks that evade human code review.

Affected Products

  • Unicode Specification through version 14.0
  • All software implementations supporting Unicode identifiers in source code
  • Programming languages and compilers that allow Unicode in identifiers

Discovery Timeline

  • 2021-11-01 - CVE-2021-42694 published to NVD
  • 2024-11-21 - Last updated in NVD database

Technical Details for CVE-2021-42694

Vulnerability Analysis

The vulnerability exploits a fundamental aspect of Unicode support in modern programming languages and development tools. When software systems implement support for The Unicode Standard, they may fail to distinguish between visually identical but semantically different characters known as homoglyphs. This creates an opportunity for attackers to craft malicious source code that appears legitimate during human review but executes differently than expected.

The attack leverages confusable characters—characters from different Unicode code points that render identically or nearly identically on screen. For example, the Latin letter "a" (U+0061) and the Cyrillic letter "а" (U+0430) appear identical in most fonts but are treated as distinct characters by compilers and interpreters.

Root Cause

The root cause stems from the Unicode Specification's inclusion of thousands of characters from various scripts, many of which are visually similar or identical. When programming languages allow Unicode characters in identifiers (variable names, function names, class names), they create an attack surface where:

  1. Two identifiers can appear identical to human reviewers
  2. Compilers treat them as distinct identifiers
  3. Malicious definitions can shadow or replace legitimate ones

This is classified under CWE-94 (Improper Control of Generation of Code) and relates to CWE-1007 (Insufficient Visual Distinction of Homoglyphs Renders Users Vulnerable to Spoofing).

Attack Vector

The attack is network-based and requires user interaction, typically occurring through supply chain compromise scenarios:

  1. An attacker identifies a popular library or dependency
  2. They create a malicious contribution containing function or variable names using homoglyphs
  3. The malicious identifiers visually match legitimate ones but contain different Unicode code points
  4. During code review, human reviewers cannot distinguish the malicious code from legitimate code
  5. When the code is merged and compiled, the malicious definitions execute instead of or alongside legitimate ones

The Trojan Source research demonstrates how these attacks can be weaponized in real-world scenarios. For example, an attacker could define a function named isАdmin using a Cyrillic "А" that shadows the legitimate isAdmin function using a Latin "A", causing security checks to be bypassed.

Detection Methods for CVE-2021-42694

Indicators of Compromise

  • Source code files containing mixed-script identifiers (e.g., Latin and Cyrillic characters in the same identifier)
  • Presence of zero-width characters or bidirectional text markers in source code
  • Multiple function or variable definitions that appear identical but have different byte sequences
  • Unusual Unicode normalization behavior in repository diffs

Detection Strategies

  • Implement static analysis tools that flag identifiers containing mixed Unicode scripts
  • Configure IDEs and code editors to highlight non-ASCII characters in identifiers
  • Use Git hooks to scan commits for suspicious Unicode patterns before acceptance
  • Deploy code review tools that can display Unicode code points alongside rendered text

Monitoring Recommendations

  • Enable logging for code repository changes and review for suspicious Unicode patterns
  • Monitor build processes for warnings related to identifier conflicts or shadowing
  • Implement automated scanning of third-party dependencies for homoglyph attacks
  • Review Unicode Technical Standards TR36 and TR39 for comprehensive security guidance

How to Mitigate CVE-2021-42694

Immediate Actions Required

  • Audit existing codebases for identifiers containing non-ASCII characters
  • Configure development environments to visually distinguish Unicode scripts
  • Implement pre-commit hooks that reject mixed-script identifiers
  • Review recent contributions to critical projects for potential homoglyph attacks

Patch Information

The Unicode Consortium has documented this class of security vulnerability in Unicode Technical Report #36, Unicode Security Considerations. Guidance on mitigations is provided in Unicode Technical Standard #39, Unicode Security Mechanisms.

Major compiler and language vendors have released updates to warn about or restrict confusable identifiers:

  • Refer to the Gentoo GLSA 202210-09 for distribution-specific guidance
  • Consult the CERT Vulnerability Report #999008 for comprehensive mitigation strategies

Workarounds

  • Restrict source code to ASCII-only identifiers in security-sensitive projects
  • Enable compiler flags that warn about confusable or mixed-script identifiers where available
  • Use repository-level policies to block commits containing suspicious Unicode patterns
  • Implement mandatory tooling checks in CI/CD pipelines to detect homoglyph attacks before code is merged
bash
# Example Git pre-commit hook to detect non-ASCII in identifiers
#!/bin/bash
# Scan staged files for suspicious Unicode patterns
git diff --cached --name-only | xargs grep -Pn '[^\\x00-\\x7F]' && \
  echo "Warning: Non-ASCII characters detected. Review for homoglyphs." && exit 1
exit 0

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeOther

  • Vendor/TechUnicode

  • SeverityHIGH

  • CVSS Score8.3

  • EPSS Probability5.25%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
  • Impact Assessment
  • ConfidentialityHigh
  • IntegrityHigh
  • AvailabilityHigh
  • CWE References
  • NVD-CWE-Other

  • CWE-94
  • Technical References
  • Openwall OSS-Sec Discussion

  • Openwall OSS-Sec Discussion

  • CWE-1007 Documentation

  • Gentoo GLSA 202210-09

  • Trojan Source Overview

  • CERT Vulnerability Report #999008

  • Scyon Blog on Source Code Trojans
  • Vendor Resources
  • Unicode Version 14.0 Release

  • Unicode Technical Report TR36

  • Unicode Technical Report TR39
  • Related CVEs
  • CVE-2025-5222: ICU Buffer Overflow Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English