PANews reported on November 23 that Port3 Network released an incident report on its X platform regarding a hacking attack. Port3 Network stated that it used NEXA Network's cross-chain token solution, CATERC20. However, CATERC20 has a boundary condition verification vulnerability. After token ownership was relinquished, the function returned a value of 0, which happens to match the ownership verification condition. Therefore, the ownership check failed, making unauthorized access possible. This issue was not mentioned in the CATERC20 audit report. Because Port3 tokens had previously relinquished ownership to achieve greater decentralization, they were in this vulnerable state.PANews reported on November 23 that Port3 Network released an incident report on its X platform regarding a hacking attack. Port3 Network stated that it used NEXA Network's cross-chain token solution, CATERC20. However, CATERC20 has a boundary condition verification vulnerability. After token ownership was relinquished, the function returned a value of 0, which happens to match the ownership verification condition. Therefore, the ownership check failed, making unauthorized access possible. This issue was not mentioned in the CATERC20 audit report. Because Port3 tokens had previously relinquished ownership to achieve greater decentralization, they were in this vulnerable state.

Port3 Network: Attacked due to a boundary condition verification vulnerability in its cross-chain token solution CATERC20.

2025/11/23 14:02

PANews reported on November 23 that Port3 Network released an incident report on its X platform regarding a hacking attack. Port3 Network stated that it used NEXA Network's cross-chain token solution, CATERC20. However, CATERC20 has a boundary condition verification vulnerability. After token ownership was relinquished, the function returned a value of 0, which happens to match the ownership verification condition. Therefore, the ownership check failed, making unauthorized access possible. This issue was not mentioned in the CATERC20 audit report. Because Port3 tokens had previously relinquished ownership to achieve greater decentralization, they were in this vulnerable state.

Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.