Port3 Network: Attacked due to a boundary condition verification vulnerability in its cross-chain token solution CATERC20
AI Summary1 min read
TL;DR
Port3 Network was hacked due to a boundary condition vulnerability in CATERC20's cross-chain token solution. The flaw allowed unauthorized access after token ownership was relinquished, bypassing checks.
Tags
Port3 NetworkCATERC20cross-chain vulnerabilityhacking attacktoken ownership
According to Mars Finance, Port3 Network released an incident report on its X platform regarding a hacking attack. Port3 Network stated that it used NEXA Network's cross-chain token solution, CATERC20. However, CATERC20 has a boundary condition verification vulnerability. After token ownership was relinquished, the function returned a value of 0, which happens to match the ownership verification condition. Therefore, the ownership check failed, making unauthorized access possible. This issue was not mentioned in the CATERC20 audit report. Since Port3 tokens had previously relinquished ownership to achieve greater decentralization, they are currently in a vulnerable state.