Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-51426: n/a

0
High
VulnerabilityCVE-2024-51426cvecve-2024-51426
Published: Wed Oct 30 2024 (10/30/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue in the PepeGxng smart contract (which can be run on the Ethereum blockchain) allows remote attackers to have an unspecified impact via the _transfer function. NOTE: this is disputed by third parties because the impact is limited to function calls.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 01:32:11 UTC

Technical Analysis

CVE-2024-51426 identifies a vulnerability in the PepeGxng smart contract on the Ethereum blockchain, specifically within its _transfer function. This function is typically responsible for handling token transfers between accounts. The vulnerability allows remote attackers, who have some level of privilege (as indicated by the CVSS vector requiring low privileges but no user interaction), to exploit the function to cause a high-impact compromise affecting confidentiality, integrity, and availability of the contract's assets or state. The exact nature of the impact is unspecified and disputed by third parties, who argue that the risk is limited to function calls and may not lead to severe consequences. However, the CVSS score of 8.8 reflects a high risk due to the potential for unauthorized transfers or manipulation of token balances, which could lead to theft or denial of service. The vulnerability is classified under CWE-863 (Incorrect Authorization), indicating that the contract fails to properly enforce access controls on the _transfer function. No patches or fixes have been published yet, and no exploits have been observed in the wild. Given the decentralized and immutable nature of blockchain smart contracts, vulnerabilities in token transfer functions can have significant financial and reputational consequences. The lack of a specified affected version suggests the vulnerability may be present in all deployed instances of the PepeGxng contract. Organizations using or interacting with this contract should be aware of the risk and prepare mitigation strategies.

Potential Impact

The potential impact of CVE-2024-51426 is substantial for organizations and individuals involved with the PepeGxng token on Ethereum. Exploitation could lead to unauthorized transfer of tokens, resulting in financial losses and erosion of trust in the affected smart contract. The vulnerability compromises confidentiality by potentially exposing transaction details or balances, integrity by allowing unauthorized modification of token ownership, and availability by possibly enabling denial of service through manipulation of contract state. Since the vulnerability requires low privileges but no user interaction, it can be exploited remotely by any entity with minimal access, increasing the attack surface. The immutable nature of blockchain transactions means that once exploited, the damage may be irreversible. This could affect decentralized finance (DeFi) platforms, exchanges, and wallets that support PepeGxng tokens, leading to broader ecosystem disruption. The absence of known exploits in the wild provides a window for proactive mitigation, but the high CVSS score underscores the urgency. Organizations relying on this contract should consider the risk of asset theft, loss of user confidence, and potential regulatory scrutiny resulting from compromised smart contract security.

Mitigation Recommendations

To mitigate CVE-2024-51426, organizations should first conduct a thorough security audit of the PepeGxng smart contract, focusing on the _transfer function and related authorization mechanisms. Implement strict access controls to ensure only authorized entities can invoke sensitive functions. Employ role-based permissions and multi-signature requirements where feasible to reduce the risk of unauthorized transfers. Monitor blockchain transactions involving PepeGxng tokens for unusual patterns indicative of exploitation attempts. Engage with the contract developers or community to advocate for an official patch or contract upgrade that addresses the authorization flaw. Until a fix is available, consider limiting exposure by restricting token usage in critical applications or migrating assets to more secure contracts. Use blockchain analytics tools to track and respond to suspicious activities promptly. Educate users and stakeholders about the risk and encourage vigilance when interacting with the PepeGxng token. Finally, maintain up-to-date incident response plans tailored to smart contract vulnerabilities and blockchain-specific threats.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-10-28T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6bb3b7ef31ef0b55a2d4

Added to database: 2/25/2026, 9:37:55 PM

Last enriched: 2/26/2026, 1:32:11 AM

Last updated: 4/12/2026, 3:43:18 PM

Views: 20

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses