Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12357: CWE-923 in ISO 15118-2 Network and Application Protocol Requirements EV Car Chargers

0
High
VulnerabilityCVE-2025-12357cvecve-2025-12357cwe-923
Published: Fri Oct 31 2025 (10/31/2025, 15:33:48 UTC)
Source: CVE Database V5
Vendor/Project: ISO 15118-2 Network and Application Protocol Requirements
Product: EV Car Chargers

Description

By manipulating the Signal Level Attenuation Characterization (SLAC) protocol with spoofed measurements, an attacker can stage a man-in-the-middle attack between an electric vehicle and chargers that comply with the ISO 15118-2 part. This vulnerability may be exploitable wirelessly, within close proximity, via electromagnetic induction.

AI-Powered Analysis

AILast updated: 01/15/2026, 16:45:50 UTC

Technical Analysis

CVE-2025-12357 is a vulnerability classified under CWE-923 affecting the ISO 15118-2 standard, which defines network and application protocol requirements for EV car chargers. The flaw arises from the ability of an attacker to manipulate the Signal Level Attenuation Characterization (SLAC) protocol by injecting spoofed measurements. SLAC is used to establish secure communication channels between an EV and the charger by characterizing the physical layer signal attenuation. By spoofing these measurements, an attacker can position themselves as a man-in-the-middle (MitM), intercepting or altering communications between the vehicle and charger. The attack vector is notable because it can be executed wirelessly via electromagnetic induction, requiring only close physical proximity, and does not require prior authentication or user interaction. The vulnerability has a CVSS 3.1 base score of 8.3, indicating high severity, with a vector emphasizing low attack complexity, no privileges required, and no user interaction. The impact includes high confidentiality loss, limited integrity compromise, and high availability disruption, potentially allowing attackers to disrupt charging sessions or exfiltrate sensitive data exchanged during the charging process. Although no exploits are currently known in the wild, the vulnerability’s presence in a critical infrastructure component for EVs makes it a significant concern. The lack of available patches underscores the need for immediate mitigation strategies focused on protocol validation and physical security controls.

Potential Impact

For European organizations, this vulnerability threatens the confidentiality and availability of EV charging infrastructure communications. Given Europe’s aggressive push towards electric mobility and the widespread deployment of ISO 15118-2 compliant chargers, attackers could exploit this flaw to intercept sensitive data such as authentication credentials or billing information, or disrupt charging services causing operational downtime. Critical infrastructure operators, fleet management companies, and public charging networks could face service interruptions, reputational damage, and financial losses. The wireless nature of the attack means that attackers only need close proximity, increasing the risk in public or semi-public charging locations. Disruption of EV charging could also hinder broader environmental and energy transition goals in Europe. Additionally, compromised chargers could be leveraged as entry points for further network intrusions if connected to enterprise systems. The vulnerability thus poses a multifaceted risk affecting confidentiality, integrity, and availability of EV charging ecosystems.

Mitigation Recommendations

1. Implement enhanced validation and anomaly detection mechanisms within the SLAC protocol stack to detect and reject spoofed attenuation measurements. 2. Employ physical security measures at charging stations to restrict unauthorized close-proximity access, such as surveillance cameras and controlled access zones. 3. Network segmentation should be enforced to isolate EV charging infrastructure from critical enterprise networks, limiting lateral movement in case of compromise. 4. Monitor charging session logs for unusual patterns indicative of MitM attacks or communication anomalies. 5. Collaborate with EV charger manufacturers and standards bodies to accelerate development and deployment of patches or protocol updates addressing this vulnerability. 6. Educate operational staff on the risks and signs of wireless proximity attacks to enable timely incident response. 7. Consider deploying electromagnetic shielding or signal hardening techniques at high-risk locations to reduce the feasibility of induction-based attacks. 8. Regularly update firmware and software components of EV chargers as vendors release security updates. 9. Engage in threat intelligence sharing within the EV and critical infrastructure sectors to stay informed about emerging exploitation attempts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
icscert
Date Reserved
2025-10-27T16:05:18.413Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6904db52cf9c100c41c3e00e

Added to database: 10/31/2025, 3:52:50 PM

Last enriched: 1/15/2026, 4:45:50 PM

Last updated: 2/5/2026, 1:34:16 AM

Views: 260

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats