Port3 Network: Attacked due to boundary condition validation vulnerability in the cross-chain token solution CATERC20
Port3 Network released an incident report on a hacking attack on platform X, stating that it adopted the cross-chain token solution CATERC20 from NEXA Network. However, CATERC20 has a boundary condition validation vulnerability. After the token ownership is relinquished, the value returned by the function is 0, which exactly matches the ownership validation condition. As a result, the ownership check fails, allowing unauthorized access. This issue was not mentioned in the CATERC20 audit report. Since the Port3 token had previously relinquished ownership for greater decentralization, it is currently in this vulnerable state.