CVE-2025-12357: CWE-923 in ISO 15118-2 Network and Application Protocol Requirements EV Car Chargers
By manipulating the Signal Level Attenuation Characterization (SLAC) protocol with spoofed measurements, an attacker can stage a man-in-the-middle attack between an electric vehicle and chargers that comply with the ISO 15118-2 part. This vulnerability may be exploitable wirelessly, within close proximity, via electromagnetic induction.
AI Analysis
Technical Summary
CVE-2025-12357 is a vulnerability classified under CWE-923 affecting the ISO 15118-2 standard, which defines network and application protocol requirements for EV car chargers. The flaw arises from the ability of an attacker to manipulate the Signal Level Attenuation Characterization (SLAC) protocol by injecting spoofed measurements. SLAC is used to establish secure communication channels between an EV and the charger by characterizing the physical layer signal attenuation. By spoofing these measurements, an attacker can position themselves as a man-in-the-middle (MitM), intercepting or altering communications between the vehicle and charger. The attack vector is notable because it can be executed wirelessly via electromagnetic induction, requiring only close physical proximity, and does not require prior authentication or user interaction. The vulnerability has a CVSS 3.1 base score of 8.3, indicating high severity, with a vector emphasizing low attack complexity, no privileges required, and no user interaction. The impact includes high confidentiality loss, limited integrity compromise, and high availability disruption, potentially allowing attackers to disrupt charging sessions or exfiltrate sensitive data exchanged during the charging process. Although no exploits are currently known in the wild, the vulnerability’s presence in a critical infrastructure component for EVs makes it a significant concern. The lack of available patches underscores the need for immediate mitigation strategies focused on protocol validation and physical security controls.
Potential Impact
For European organizations, this vulnerability threatens the confidentiality and availability of EV charging infrastructure communications. Given Europe’s aggressive push towards electric mobility and the widespread deployment of ISO 15118-2 compliant chargers, attackers could exploit this flaw to intercept sensitive data such as authentication credentials or billing information, or disrupt charging services causing operational downtime. Critical infrastructure operators, fleet management companies, and public charging networks could face service interruptions, reputational damage, and financial losses. The wireless nature of the attack means that attackers only need close proximity, increasing the risk in public or semi-public charging locations. Disruption of EV charging could also hinder broader environmental and energy transition goals in Europe. Additionally, compromised chargers could be leveraged as entry points for further network intrusions if connected to enterprise systems. The vulnerability thus poses a multifaceted risk affecting confidentiality, integrity, and availability of EV charging ecosystems.
Mitigation Recommendations
1. Implement enhanced validation and anomaly detection mechanisms within the SLAC protocol stack to detect and reject spoofed attenuation measurements. 2. Employ physical security measures at charging stations to restrict unauthorized close-proximity access, such as surveillance cameras and controlled access zones. 3. Network segmentation should be enforced to isolate EV charging infrastructure from critical enterprise networks, limiting lateral movement in case of compromise. 4. Monitor charging session logs for unusual patterns indicative of MitM attacks or communication anomalies. 5. Collaborate with EV charger manufacturers and standards bodies to accelerate development and deployment of patches or protocol updates addressing this vulnerability. 6. Educate operational staff on the risks and signs of wireless proximity attacks to enable timely incident response. 7. Consider deploying electromagnetic shielding or signal hardening techniques at high-risk locations to reduce the feasibility of induction-based attacks. 8. Regularly update firmware and software components of EV chargers as vendors release security updates. 9. Engage in threat intelligence sharing within the EV and critical infrastructure sectors to stay informed about emerging exploitation attempts.
Affected Countries
Germany, France, Netherlands, Norway, Sweden, United Kingdom, Belgium, Denmark
CVE-2025-12357: CWE-923 in ISO 15118-2 Network and Application Protocol Requirements EV Car Chargers
Description
By manipulating the Signal Level Attenuation Characterization (SLAC) protocol with spoofed measurements, an attacker can stage a man-in-the-middle attack between an electric vehicle and chargers that comply with the ISO 15118-2 part. This vulnerability may be exploitable wirelessly, within close proximity, via electromagnetic induction.
AI-Powered Analysis
Technical Analysis
CVE-2025-12357 is a vulnerability classified under CWE-923 affecting the ISO 15118-2 standard, which defines network and application protocol requirements for EV car chargers. The flaw arises from the ability of an attacker to manipulate the Signal Level Attenuation Characterization (SLAC) protocol by injecting spoofed measurements. SLAC is used to establish secure communication channels between an EV and the charger by characterizing the physical layer signal attenuation. By spoofing these measurements, an attacker can position themselves as a man-in-the-middle (MitM), intercepting or altering communications between the vehicle and charger. The attack vector is notable because it can be executed wirelessly via electromagnetic induction, requiring only close physical proximity, and does not require prior authentication or user interaction. The vulnerability has a CVSS 3.1 base score of 8.3, indicating high severity, with a vector emphasizing low attack complexity, no privileges required, and no user interaction. The impact includes high confidentiality loss, limited integrity compromise, and high availability disruption, potentially allowing attackers to disrupt charging sessions or exfiltrate sensitive data exchanged during the charging process. Although no exploits are currently known in the wild, the vulnerability’s presence in a critical infrastructure component for EVs makes it a significant concern. The lack of available patches underscores the need for immediate mitigation strategies focused on protocol validation and physical security controls.
Potential Impact
For European organizations, this vulnerability threatens the confidentiality and availability of EV charging infrastructure communications. Given Europe’s aggressive push towards electric mobility and the widespread deployment of ISO 15118-2 compliant chargers, attackers could exploit this flaw to intercept sensitive data such as authentication credentials or billing information, or disrupt charging services causing operational downtime. Critical infrastructure operators, fleet management companies, and public charging networks could face service interruptions, reputational damage, and financial losses. The wireless nature of the attack means that attackers only need close proximity, increasing the risk in public or semi-public charging locations. Disruption of EV charging could also hinder broader environmental and energy transition goals in Europe. Additionally, compromised chargers could be leveraged as entry points for further network intrusions if connected to enterprise systems. The vulnerability thus poses a multifaceted risk affecting confidentiality, integrity, and availability of EV charging ecosystems.
Mitigation Recommendations
1. Implement enhanced validation and anomaly detection mechanisms within the SLAC protocol stack to detect and reject spoofed attenuation measurements. 2. Employ physical security measures at charging stations to restrict unauthorized close-proximity access, such as surveillance cameras and controlled access zones. 3. Network segmentation should be enforced to isolate EV charging infrastructure from critical enterprise networks, limiting lateral movement in case of compromise. 4. Monitor charging session logs for unusual patterns indicative of MitM attacks or communication anomalies. 5. Collaborate with EV charger manufacturers and standards bodies to accelerate development and deployment of patches or protocol updates addressing this vulnerability. 6. Educate operational staff on the risks and signs of wireless proximity attacks to enable timely incident response. 7. Consider deploying electromagnetic shielding or signal hardening techniques at high-risk locations to reduce the feasibility of induction-based attacks. 8. Regularly update firmware and software components of EV chargers as vendors release security updates. 9. Engage in threat intelligence sharing within the EV and critical infrastructure sectors to stay informed about emerging exploitation attempts.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- icscert
- Date Reserved
- 2025-10-27T16:05:18.413Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6904db52cf9c100c41c3e00e
Added to database: 10/31/2025, 3:52:50 PM
Last enriched: 1/15/2026, 4:45:50 PM
Last updated: 2/7/2026, 9:04:21 AM
Views: 261
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2079: Improper Authorization in yeqifu warehouse
MediumCVE-2026-1675: CWE-1188 Initialization of a Resource with an Insecure Default in brstefanovic Advanced Country Blocker
MediumCVE-2026-1643: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ariagle MP-Ukagaka
MediumCVE-2026-1634: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in alexdtn Subitem AL Slider
MediumCVE-2026-1613: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in mrlister1 Wonka Slide
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.