Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12357: CWE-923 in ISO 15118-2 Network and Application Protocol Requirements EV Car Chargers

0
Medium
VulnerabilityCVE-2025-12357cvecve-2025-12357cwe-923
Published: Fri Oct 31 2025 (10/31/2025, 15:33:48 UTC)
Source: CVE Database V5
Vendor/Project: ISO 15118-2 Network and Application Protocol Requirements
Product: EV Car Chargers

Description

CVE-2025-12357 is a medium-severity vulnerability in the ISO 15118-2 protocol used by electric vehicle (EV) chargers. It involves manipulation of the Signal Level Attenuation Characterization (SLAC) protocol via spoofed measurements, enabling a man-in-the-middle (MitM) attack between an EV and its charger. The attack can be conducted wirelessly within close proximity through electromagnetic induction, without requiring authentication or user interaction. This vulnerability impacts confidentiality, integrity, and availability of the charging communication, potentially allowing attackers to intercept or alter charging commands and data. No known exploits are currently in the wild, and no patches have been published yet. Organizations deploying ISO 15118-2 compliant EV chargers should prioritize mitigation to prevent unauthorized access and data manipulation. Countries with significant EV adoption and infrastructure, such as the United States, Germany, China, Japan, and others, are at higher risk. The vulnerability’s CVSS score is 6. 3, reflecting medium severity due to its remote attack vector but limited scope and impact. Defenders should implement network segmentation, monitor for anomalous SLAC traffic, and apply vendor updates once available.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/25/2026, 01:00:17 UTC

Technical Analysis

CVE-2025-12357 identifies a vulnerability in the ISO 15118-2 standard, which governs network and application protocol requirements for electric vehicle (EV) charging systems. The flaw arises from the ability of an attacker to manipulate the Signal Level Attenuation Characterization (SLAC) protocol, which is used to establish and maintain secure communication channels between EVs and charging stations. By injecting spoofed SLAC measurements, an attacker can perform a man-in-the-middle (MitM) attack, intercepting and potentially altering data exchanged during the charging session. This attack vector is notable because it can be executed wirelessly within close physical proximity, leveraging electromagnetic induction to communicate with the charging system without direct physical connections or prior authentication. The vulnerability is classified under CWE-923, indicating improper use of a communication channel or protocol leading to security weaknesses. The CVSS 3.1 base score of 6.3 reflects a medium severity, with an attack vector requiring adjacent network access (AV:A), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The impact affects confidentiality, integrity, and availability, but the scope remains unchanged (S:U). Currently, there are no known exploits in the wild, and no patches have been released, highlighting the need for proactive defensive measures. This vulnerability could undermine the trustworthiness of EV charging infrastructure, potentially leading to unauthorized data interception, manipulation of charging parameters, or denial of service conditions.

Potential Impact

The vulnerability poses a significant risk to the confidentiality, integrity, and availability of communications between electric vehicles and charging stations. Successful exploitation could allow attackers to intercept sensitive data such as authentication credentials or billing information, manipulate charging commands to disrupt or alter charging sessions, or cause denial of service by interfering with the communication protocol. This could result in financial losses, operational disruptions, and erosion of user trust in EV infrastructure. Given the increasing adoption of EVs globally and reliance on ISO 15118-2 compliant chargers, the impact could be widespread, affecting individual consumers, fleet operators, and public charging networks. Moreover, the wireless nature of the attack within close proximity raises concerns about physical security and the need for secure environments around charging stations. Although no exploits are currently known, the vulnerability could be leveraged by attackers with physical access to charging areas, including malicious insiders or opportunistic attackers in public spaces. The medium severity score reflects the balance between the attack feasibility and the limited range of impact, but the strategic importance of EV infrastructure elevates the overall risk profile.

Mitigation Recommendations

To mitigate this vulnerability, organizations should implement a multi-layered security approach. First, physical security controls should be enhanced around EV charging stations to limit unauthorized proximity access, including surveillance and access restrictions. Network segmentation should be employed to isolate charging infrastructure from critical enterprise networks, reducing the potential impact of a compromise. Monitoring and anomaly detection systems should be configured to identify unusual SLAC protocol traffic patterns or unexpected signal characteristics indicative of spoofing attempts. Vendors and operators should prioritize firmware and software updates as soon as patches become available, ensuring compliance with the latest security standards. Additionally, implementing cryptographic enhancements or mutual authentication mechanisms at the protocol level could reduce the risk of MitM attacks. Training personnel on the risks associated with EV charging infrastructure and establishing incident response plans specific to these systems will further strengthen defenses. Collaboration with industry groups and standards bodies to accelerate security improvements in ISO 15118-2 implementations is also recommended.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
icscert
Date Reserved
2025-10-27T16:05:18.413Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6904db52cf9c100c41c3e00e

Added to database: 10/31/2025, 3:52:50 PM

Last enriched: 3/25/2026, 1:00:17 AM

Last updated: 5/10/2026, 4:38:23 AM

Views: 304

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses