Port3 Network to Issue New Token After CATERC20 Vulnerability Exploit
Port3 Network disclosed on Nov. 23 that its PORT3 token was exploited due to a boundary condition validation flaw in the CATERC20 cross-chain token standard from Nexa Network. The vulnerability allowed unauthorized access when token ownership was renounced, as the function return value matched the owner verification condition. An attacker registered address 0xb13A...812E as an authorized address via RegisterChains operation at 20:56:24 UTC, with subsequent attacks from addresses including 0x7C2F...551fF using the same method. The team has contacted major exchanges to suspend deposits and withdrawals and will issue a revised token to resolve the issue.