CVE-2025-12357: CWE-923 in ISO 15118-2 Network and Application Protocol Requirements EV Car Chargers
By manipulating the Signal Level Attenuation Characterization (SLAC) protocol with spoofed measurements, an attacker can stage a man-in-the-middle attack between an electric vehicle and chargers that comply with the ISO 15118-2 part. This vulnerability may be exploitable wirelessly, within close proximity, via electromagnetic induction.
AI Analysis
Technical Summary
CVE-2025-12357 is a vulnerability identified in the ISO 15118-2 standard, which governs network and application protocol requirements for electric vehicle (EV) charging systems. The vulnerability arises from improper handling of the Signal Level Attenuation Characterization (SLAC) protocol, which is used to establish secure communication channels between EVs and charging stations. An attacker can spoof SLAC measurements to manipulate the protocol, effectively positioning themselves as a man-in-the-middle (MitM) between the EV and the charger. This MitM attack can intercept, alter, or disrupt communications, potentially leading to unauthorized access, data leakage, or denial of service during charging sessions. Notably, the attack vector includes wireless exploitation via electromagnetic induction, requiring only close physical proximity to the target devices. The vulnerability does not require prior authentication or user interaction, increasing its risk profile. The CVSS v3.1 score of 6.3 reflects a medium severity, with low attack complexity and no privileges required. While no public exploits have been reported, the potential for misuse exists given the increasing deployment of ISO 15118-2 compliant EV chargers worldwide. The vulnerability is categorized under CWE-923, which relates to improper control of communication channel security. The lack of available patches at the time of publication underscores the need for proactive mitigation strategies.
Potential Impact
The vulnerability poses significant risks to organizations and individuals relying on ISO 15118-2 compliant EV charging infrastructure. A successful MitM attack could compromise the confidentiality of sensitive data exchanged during charging, such as authentication credentials or billing information. Integrity of the communication can be undermined, allowing attackers to manipulate charging parameters or disrupt the charging process, potentially causing denial of service or damage to the vehicle’s battery management system. Availability may also be affected if attackers interfere with the charging session, leading to operational downtime. For commercial EV charging networks, this could translate into financial losses, reputational damage, and regulatory compliance issues. The wireless nature of the attack, leveraging electromagnetic induction, means that attackers do not need physical access to cables or hardware ports, only close proximity, increasing the attack surface in public or semi-public charging locations. As EV adoption grows globally, the scale and impact of this vulnerability could expand, affecting critical transportation infrastructure and smart grid integrations.
Mitigation Recommendations
To mitigate CVE-2025-12357, organizations should implement the following specific measures: 1) Employ enhanced SLAC protocol validation and anomaly detection to identify and reject spoofed attenuation measurements. 2) Use physical security controls to restrict unauthorized close proximity access to EV charging stations, such as surveillance cameras and access barriers. 3) Deploy firmware and software updates from EV charger manufacturers as they become available, ensuring patches address SLAC protocol weaknesses. 4) Implement network segmentation and monitoring to detect unusual traffic patterns indicative of MitM attacks. 5) Utilize cryptographic protections and mutual authentication mechanisms beyond SLAC to secure communication channels between EVs and chargers. 6) Conduct regular security assessments and penetration testing focused on wireless attack vectors including electromagnetic induction. 7) Educate personnel and users about the risks of close proximity attacks and encourage vigilance around public charging stations. 8) Collaborate with industry groups and standards bodies to accelerate development of protocol enhancements and security best practices. These targeted actions go beyond generic advice by focusing on the unique wireless and protocol-specific aspects of this vulnerability.
Affected Countries
United States, Germany, China, Japan, South Korea, France, United Kingdom, Netherlands, Canada, Norway, Sweden, Australia
CVE-2025-12357: CWE-923 in ISO 15118-2 Network and Application Protocol Requirements EV Car Chargers
Description
By manipulating the Signal Level Attenuation Characterization (SLAC) protocol with spoofed measurements, an attacker can stage a man-in-the-middle attack between an electric vehicle and chargers that comply with the ISO 15118-2 part. This vulnerability may be exploitable wirelessly, within close proximity, via electromagnetic induction.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-12357 is a vulnerability identified in the ISO 15118-2 standard, which governs network and application protocol requirements for electric vehicle (EV) charging systems. The vulnerability arises from improper handling of the Signal Level Attenuation Characterization (SLAC) protocol, which is used to establish secure communication channels between EVs and charging stations. An attacker can spoof SLAC measurements to manipulate the protocol, effectively positioning themselves as a man-in-the-middle (MitM) between the EV and the charger. This MitM attack can intercept, alter, or disrupt communications, potentially leading to unauthorized access, data leakage, or denial of service during charging sessions. Notably, the attack vector includes wireless exploitation via electromagnetic induction, requiring only close physical proximity to the target devices. The vulnerability does not require prior authentication or user interaction, increasing its risk profile. The CVSS v3.1 score of 6.3 reflects a medium severity, with low attack complexity and no privileges required. While no public exploits have been reported, the potential for misuse exists given the increasing deployment of ISO 15118-2 compliant EV chargers worldwide. The vulnerability is categorized under CWE-923, which relates to improper control of communication channel security. The lack of available patches at the time of publication underscores the need for proactive mitigation strategies.
Potential Impact
The vulnerability poses significant risks to organizations and individuals relying on ISO 15118-2 compliant EV charging infrastructure. A successful MitM attack could compromise the confidentiality of sensitive data exchanged during charging, such as authentication credentials or billing information. Integrity of the communication can be undermined, allowing attackers to manipulate charging parameters or disrupt the charging process, potentially causing denial of service or damage to the vehicle’s battery management system. Availability may also be affected if attackers interfere with the charging session, leading to operational downtime. For commercial EV charging networks, this could translate into financial losses, reputational damage, and regulatory compliance issues. The wireless nature of the attack, leveraging electromagnetic induction, means that attackers do not need physical access to cables or hardware ports, only close proximity, increasing the attack surface in public or semi-public charging locations. As EV adoption grows globally, the scale and impact of this vulnerability could expand, affecting critical transportation infrastructure and smart grid integrations.
Mitigation Recommendations
To mitigate CVE-2025-12357, organizations should implement the following specific measures: 1) Employ enhanced SLAC protocol validation and anomaly detection to identify and reject spoofed attenuation measurements. 2) Use physical security controls to restrict unauthorized close proximity access to EV charging stations, such as surveillance cameras and access barriers. 3) Deploy firmware and software updates from EV charger manufacturers as they become available, ensuring patches address SLAC protocol weaknesses. 4) Implement network segmentation and monitoring to detect unusual traffic patterns indicative of MitM attacks. 5) Utilize cryptographic protections and mutual authentication mechanisms beyond SLAC to secure communication channels between EVs and chargers. 6) Conduct regular security assessments and penetration testing focused on wireless attack vectors including electromagnetic induction. 7) Educate personnel and users about the risks of close proximity attacks and encourage vigilance around public charging stations. 8) Collaborate with industry groups and standards bodies to accelerate development of protocol enhancements and security best practices. These targeted actions go beyond generic advice by focusing on the unique wireless and protocol-specific aspects of this vulnerability.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- icscert
- Date Reserved
- 2025-10-27T16:05:18.413Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6904db52cf9c100c41c3e00e
Added to database: 10/31/2025, 3:52:50 PM
Last enriched: 3/17/2026, 6:15:53 PM
Last updated: 3/23/2026, 9:05:56 AM
Views: 280
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.