Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-51425: n/a

0
High
VulnerabilityCVE-2024-51425cvecve-2024-51425
Published: Wed Oct 30 2024 (10/30/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue in the WaterToken smart contract (which can be run on the Ethereum blockchain) allows remote attackers to have an unspecified impact. NOTE: this is disputed by third parties because the impact is limited to function calls.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 01:31:52 UTC

Technical Analysis

CVE-2024-51425 identifies a vulnerability in the WaterToken smart contract deployed on the Ethereum blockchain. The vulnerability stems from an authorization bypass (CWE-863), where remote attackers with some level of privileges can invoke functions that should be restricted, potentially leading to unauthorized actions within the contract. Although the exact impact is not fully detailed and is disputed by third parties, the CVSS 3.1 score of 8.8 indicates a high severity, reflecting the potential for significant compromise of confidentiality, integrity, and availability. The attack vector is network-based (remote), requiring low attack complexity and privileges but no user interaction. The scope is unchanged, meaning the vulnerability affects only the vulnerable component (the WaterToken contract). The lack of patches and known exploits suggests this is a newly disclosed issue. Given the immutable nature of blockchain smart contracts, remediation may require contract upgrades or migration to new contracts with corrected authorization logic. This vulnerability highlights the critical importance of rigorous access control and authorization checks in smart contract development to prevent unauthorized function calls that could disrupt token operations or compromise user assets.

Potential Impact

The vulnerability could allow attackers with limited privileges to perform unauthorized function calls on the WaterToken smart contract, potentially leading to unauthorized transfer or manipulation of tokens, disruption of contract operations, or leakage of sensitive contract state information. This can undermine the trust and financial security of token holders and associated DeFi platforms relying on WaterToken. The high CVSS score suggests that confidentiality, integrity, and availability of the contract and its assets could be severely impacted. Organizations using WaterToken or integrating it into their platforms may face financial losses, reputational damage, and regulatory scrutiny. The immutable nature of blockchain contracts complicates remediation, increasing the risk of prolonged exposure. Although no exploits are currently known, the vulnerability presents a significant risk if weaponized, especially as attackers often target DeFi smart contracts for financial gain.

Mitigation Recommendations

1. Conduct a thorough audit of the WaterToken smart contract’s authorization logic to identify and restrict unauthorized function calls. 2. Implement role-based access control (RBAC) or multi-signature requirements for sensitive functions to reduce risk of misuse. 3. If possible, deploy an upgraded version of the contract with corrected authorization checks and migrate token holders to the new contract. 4. Monitor blockchain transactions involving WaterToken for suspicious activity indicative of exploitation attempts. 5. Limit privileges granted to external users or contracts interacting with WaterToken to the minimum necessary. 6. Engage with blockchain security experts to perform penetration testing and formal verification of smart contract code. 7. Inform stakeholders and users about the vulnerability and encourage caution in interacting with WaterToken until mitigations are in place. 8. Consider using smart contract upgradeability patterns or proxy contracts to allow patching vulnerabilities in the future.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-10-28T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6bb3b7ef31ef0b55a2d1

Added to database: 2/25/2026, 9:37:55 PM

Last enriched: 2/26/2026, 1:31:52 AM

Last updated: 4/12/2026, 1:56:39 PM

Views: 18

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses