PANews reported on November 23 that Port3 Network released an incident report on its X platform regarding a hacking attack. Port3 Network stated that it used NEXA Network's cross-chain token solution, CATERC20. However, CATERC20 has a boundary condition verification vulnerability. After token ownership was relinquished, the function returned a value of 0, which happens to match the ownership verification condition. Therefore, the ownership check failed, making unauthorized access possible. This issue was not mentioned in the CATERC20 audit report. Because Port3 tokens had previously relinquished ownership to achieve greater decentralization, they were in this vulnerable state.PANews reported on November 23 that Port3 Network released an incident report on its X platform regarding a hacking attack. Port3 Network stated that it used NEXA Network's cross-chain token solution, CATERC20. However, CATERC20 has a boundary condition verification vulnerability. After token ownership was relinquished, the function returned a value of 0, which happens to match the ownership verification condition. Therefore, the ownership check failed, making unauthorized access possible. This issue was not mentioned in the CATERC20 audit report. Because Port3 tokens had previously relinquished ownership to achieve greater decentralization, they were in this vulnerable state.

Port3 Network: Attacked due to a boundary condition verification vulnerability in its cross-chain token solution CATERC20.

2025/11/23 14:02

PANews reported on November 23 that Port3 Network released an incident report on its X platform regarding a hacking attack. Port3 Network stated that it used NEXA Network's cross-chain token solution, CATERC20. However, CATERC20 has a boundary condition verification vulnerability. After token ownership was relinquished, the function returned a value of 0, which happens to match the ownership verification condition. Therefore, the ownership check failed, making unauthorized access possible. This issue was not mentioned in the CATERC20 audit report. Because Port3 tokens had previously relinquished ownership to achieve greater decentralization, they were in this vulnerable state.

הצהרת סיכום: המאמרים המתפרסמים מחדש באתר זה מקורם בפלטפורמות ציבוריות ונמסרים לצרכי מידע בלבד. הם אינם משקפים בהכרח את עמדותיה של MEXC. כל הזכויות שמורות למחברים המקוריים. אם אתה סבור שתוכן כלשהו מפר זכויות צד שלישי, אנא צרו קשר עם service@support.mexc.com לבקשת הסרה. MEXC אינה מתחייבת לדיוק, לשלמות או לעדכניות התוכן, ואינה אחראית לכל פעולה שתינקט על סמך המידע המסופק. התוכן אינו מהווה ייעוץ פיננסי, משפטי או מקצועי אחר, ואין לראות בו המלצה או אישור מטעם MEXC.