Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12357: CWE-923 in ISO 15118-2 Network and Application Protocol Requirements EV Car Chargers

0
High
VulnerabilityCVE-2025-12357cvecve-2025-12357cwe-923
Published: Fri Oct 31 2025 (10/31/2025, 15:33:48 UTC)
Source: CVE Database V5
Vendor/Project: ISO 15118-2 Network and Application Protocol Requirements
Product: EV Car Chargers

Description

By manipulating the Signal Level Attenuation Characterization (SLAC) protocol with spoofed measurements, an attacker can stage a man-in-the-middle attack between an electric vehicle and chargers that comply with the ISO 15118-2 part. This vulnerability may be exploitable wirelessly, within close proximity, via electromagnetic induction.

AI-Powered Analysis

AILast updated: 11/08/2025, 02:26:19 UTC

Technical Analysis

CVE-2025-12357 identifies a vulnerability in the ISO 15118-2 standard, which governs network and application protocol requirements for electric vehicle (EV) chargers. The weakness lies in the Signal Level Attenuation Characterization (SLAC) protocol, which is used to establish secure communication channels between EVs and chargers over power line communication. An attacker can manipulate SLAC by injecting spoofed attenuation measurements, enabling a man-in-the-middle (MitM) attack. This allows interception, modification, or disruption of communication between the EV and charger. Notably, the attack can be conducted wirelessly via electromagnetic induction within close physical proximity, without requiring any prior authentication or user interaction, making it particularly insidious. The vulnerability is classified under CWE-923, which relates to improper control of communication channel or protocol. The CVSS 3.1 score of 8.3 (AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:H) indicates that the attack requires adjacent network access (local proximity), has low complexity, no privileges or user interaction needed, and results in high confidentiality and availability impacts, with limited integrity impact. Although no known exploits are currently in the wild, the potential for disruption of EV charging sessions and data interception is significant, especially as EV adoption grows. The lack of available patches suggests that manufacturers and standards bodies need to urgently address this protocol-level flaw.

Potential Impact

For European organizations, this vulnerability poses a critical risk to the rapidly expanding EV charging infrastructure, which is integral to national sustainability and transportation strategies. Confidentiality impacts include potential interception of sensitive data exchanged during charging sessions, such as user credentials or billing information. Availability impacts are severe, as attackers could disrupt or deny charging services, affecting both private and public EV users. This could undermine trust in EV infrastructure and slow adoption rates. Integrity impact is lower but still present, as attackers might alter communication parameters, potentially causing charging malfunctions or safety issues. The wireless, proximity-based nature of the attack means that attackers could operate in public charging locations, increasing the risk to commercial charging networks and fleet operators. European energy providers, municipalities, and EV infrastructure operators must consider the operational and reputational risks. The vulnerability also raises concerns about the security of future smart grid integrations and vehicle-to-grid communications, which rely on secure EV charger protocols.

Mitigation Recommendations

Mitigation should focus on multiple layers: First, EV charger manufacturers must update firmware to implement robust validation and authentication mechanisms for SLAC protocol measurements, preventing spoofing attempts. This may involve cryptographic verification of attenuation data or enhanced anomaly detection algorithms. Second, operators should enforce physical security measures at charging stations to restrict unauthorized close proximity access, such as surveillance cameras, access controls, or shielding to reduce electromagnetic induction attack feasibility. Third, network segmentation and monitoring should be applied to isolate EV charging networks from critical IT infrastructure and detect unusual SLAC or communication patterns indicative of MitM attempts. Fourth, collaboration with standards bodies to revise ISO 15118-2 to address this protocol weakness is essential for long-term security. Finally, raising awareness among EV infrastructure stakeholders about this threat will help prioritize timely patch deployment and incident response planning. Organizations should also consider deploying intrusion detection systems tailored to power line communication anomalies and conduct regular security assessments of EV charging points.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
icscert
Date Reserved
2025-10-27T16:05:18.413Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6904db52cf9c100c41c3e00e

Added to database: 10/31/2025, 3:52:50 PM

Last enriched: 11/8/2025, 2:26:19 AM

Last updated: 12/15/2025, 3:15:59 PM

Views: 228

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats