CVE-2025-12357: CWE-923 in ISO 15118-2 Network and Application Protocol Requirements EV Car Chargers
CVE-2025-12357 is a medium-severity vulnerability in the ISO 15118-2 protocol used by electric vehicle (EV) chargers. It involves manipulation of the Signal Level Attenuation Characterization (SLAC) protocol via spoofed measurements, enabling a man-in-the-middle (MitM) attack between an EV and its charger. The attack can be conducted wirelessly within close proximity through electromagnetic induction, without requiring authentication or user interaction. This vulnerability impacts confidentiality, integrity, and availability of the charging communication, potentially allowing attackers to intercept or alter charging commands and data. No known exploits are currently in the wild, and no patches have been published yet. Organizations deploying ISO 15118-2 compliant EV chargers should prioritize mitigation to prevent unauthorized access and data manipulation. Countries with significant EV adoption and infrastructure, such as the United States, Germany, China, Japan, and others, are at higher risk. The vulnerability’s CVSS score is 6. 3, reflecting medium severity due to its remote attack vector but limited scope and impact. Defenders should implement network segmentation, monitor for anomalous SLAC traffic, and apply vendor updates once available.
AI Analysis
Technical Summary
CVE-2025-12357 identifies a vulnerability in the ISO 15118-2 standard, which governs network and application protocol requirements for electric vehicle (EV) charging systems. The flaw arises from the ability of an attacker to manipulate the Signal Level Attenuation Characterization (SLAC) protocol, which is used to establish and maintain secure communication channels between EVs and charging stations. By injecting spoofed SLAC measurements, an attacker can perform a man-in-the-middle (MitM) attack, intercepting and potentially altering data exchanged during the charging session. This attack vector is notable because it can be executed wirelessly within close physical proximity, leveraging electromagnetic induction to communicate with the charging system without direct physical connections or prior authentication. The vulnerability is classified under CWE-923, indicating improper use of a communication channel or protocol leading to security weaknesses. The CVSS 3.1 base score of 6.3 reflects a medium severity, with an attack vector requiring adjacent network access (AV:A), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The impact affects confidentiality, integrity, and availability, but the scope remains unchanged (S:U). Currently, there are no known exploits in the wild, and no patches have been released, highlighting the need for proactive defensive measures. This vulnerability could undermine the trustworthiness of EV charging infrastructure, potentially leading to unauthorized data interception, manipulation of charging parameters, or denial of service conditions.
Potential Impact
The vulnerability poses a significant risk to the confidentiality, integrity, and availability of communications between electric vehicles and charging stations. Successful exploitation could allow attackers to intercept sensitive data such as authentication credentials or billing information, manipulate charging commands to disrupt or alter charging sessions, or cause denial of service by interfering with the communication protocol. This could result in financial losses, operational disruptions, and erosion of user trust in EV infrastructure. Given the increasing adoption of EVs globally and reliance on ISO 15118-2 compliant chargers, the impact could be widespread, affecting individual consumers, fleet operators, and public charging networks. Moreover, the wireless nature of the attack within close proximity raises concerns about physical security and the need for secure environments around charging stations. Although no exploits are currently known, the vulnerability could be leveraged by attackers with physical access to charging areas, including malicious insiders or opportunistic attackers in public spaces. The medium severity score reflects the balance between the attack feasibility and the limited range of impact, but the strategic importance of EV infrastructure elevates the overall risk profile.
Mitigation Recommendations
To mitigate this vulnerability, organizations should implement a multi-layered security approach. First, physical security controls should be enhanced around EV charging stations to limit unauthorized proximity access, including surveillance and access restrictions. Network segmentation should be employed to isolate charging infrastructure from critical enterprise networks, reducing the potential impact of a compromise. Monitoring and anomaly detection systems should be configured to identify unusual SLAC protocol traffic patterns or unexpected signal characteristics indicative of spoofing attempts. Vendors and operators should prioritize firmware and software updates as soon as patches become available, ensuring compliance with the latest security standards. Additionally, implementing cryptographic enhancements or mutual authentication mechanisms at the protocol level could reduce the risk of MitM attacks. Training personnel on the risks associated with EV charging infrastructure and establishing incident response plans specific to these systems will further strengthen defenses. Collaboration with industry groups and standards bodies to accelerate security improvements in ISO 15118-2 implementations is also recommended.
Affected Countries
United States, Germany, China, Japan, South Korea, France, United Kingdom, Netherlands, Canada, Norway, Sweden
CVE-2025-12357: CWE-923 in ISO 15118-2 Network and Application Protocol Requirements EV Car Chargers
Description
CVE-2025-12357 is a medium-severity vulnerability in the ISO 15118-2 protocol used by electric vehicle (EV) chargers. It involves manipulation of the Signal Level Attenuation Characterization (SLAC) protocol via spoofed measurements, enabling a man-in-the-middle (MitM) attack between an EV and its charger. The attack can be conducted wirelessly within close proximity through electromagnetic induction, without requiring authentication or user interaction. This vulnerability impacts confidentiality, integrity, and availability of the charging communication, potentially allowing attackers to intercept or alter charging commands and data. No known exploits are currently in the wild, and no patches have been published yet. Organizations deploying ISO 15118-2 compliant EV chargers should prioritize mitigation to prevent unauthorized access and data manipulation. Countries with significant EV adoption and infrastructure, such as the United States, Germany, China, Japan, and others, are at higher risk. The vulnerability’s CVSS score is 6. 3, reflecting medium severity due to its remote attack vector but limited scope and impact. Defenders should implement network segmentation, monitor for anomalous SLAC traffic, and apply vendor updates once available.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-12357 identifies a vulnerability in the ISO 15118-2 standard, which governs network and application protocol requirements for electric vehicle (EV) charging systems. The flaw arises from the ability of an attacker to manipulate the Signal Level Attenuation Characterization (SLAC) protocol, which is used to establish and maintain secure communication channels between EVs and charging stations. By injecting spoofed SLAC measurements, an attacker can perform a man-in-the-middle (MitM) attack, intercepting and potentially altering data exchanged during the charging session. This attack vector is notable because it can be executed wirelessly within close physical proximity, leveraging electromagnetic induction to communicate with the charging system without direct physical connections or prior authentication. The vulnerability is classified under CWE-923, indicating improper use of a communication channel or protocol leading to security weaknesses. The CVSS 3.1 base score of 6.3 reflects a medium severity, with an attack vector requiring adjacent network access (AV:A), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The impact affects confidentiality, integrity, and availability, but the scope remains unchanged (S:U). Currently, there are no known exploits in the wild, and no patches have been released, highlighting the need for proactive defensive measures. This vulnerability could undermine the trustworthiness of EV charging infrastructure, potentially leading to unauthorized data interception, manipulation of charging parameters, or denial of service conditions.
Potential Impact
The vulnerability poses a significant risk to the confidentiality, integrity, and availability of communications between electric vehicles and charging stations. Successful exploitation could allow attackers to intercept sensitive data such as authentication credentials or billing information, manipulate charging commands to disrupt or alter charging sessions, or cause denial of service by interfering with the communication protocol. This could result in financial losses, operational disruptions, and erosion of user trust in EV infrastructure. Given the increasing adoption of EVs globally and reliance on ISO 15118-2 compliant chargers, the impact could be widespread, affecting individual consumers, fleet operators, and public charging networks. Moreover, the wireless nature of the attack within close proximity raises concerns about physical security and the need for secure environments around charging stations. Although no exploits are currently known, the vulnerability could be leveraged by attackers with physical access to charging areas, including malicious insiders or opportunistic attackers in public spaces. The medium severity score reflects the balance between the attack feasibility and the limited range of impact, but the strategic importance of EV infrastructure elevates the overall risk profile.
Mitigation Recommendations
To mitigate this vulnerability, organizations should implement a multi-layered security approach. First, physical security controls should be enhanced around EV charging stations to limit unauthorized proximity access, including surveillance and access restrictions. Network segmentation should be employed to isolate charging infrastructure from critical enterprise networks, reducing the potential impact of a compromise. Monitoring and anomaly detection systems should be configured to identify unusual SLAC protocol traffic patterns or unexpected signal characteristics indicative of spoofing attempts. Vendors and operators should prioritize firmware and software updates as soon as patches become available, ensuring compliance with the latest security standards. Additionally, implementing cryptographic enhancements or mutual authentication mechanisms at the protocol level could reduce the risk of MitM attacks. Training personnel on the risks associated with EV charging infrastructure and establishing incident response plans specific to these systems will further strengthen defenses. Collaboration with industry groups and standards bodies to accelerate security improvements in ISO 15118-2 implementations is also recommended.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- icscert
- Date Reserved
- 2025-10-27T16:05:18.413Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6904db52cf9c100c41c3e00e
Added to database: 10/31/2025, 3:52:50 PM
Last enriched: 3/25/2026, 1:00:17 AM
Last updated: 5/10/2026, 4:38:23 AM
Views: 304
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.