By manipulating the Signal Level Attenuation Characterization (SLAC)
protocol with spoofed measurements, an attacker can stage a
man-in-the-middle attack between an electric vehicle and chargers that
comply with the ISO 15118-2 part. This vulnerability may be exploitable
wirelessly, within close proximity, via electromagnetic induction.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

ISO recommends using TLS for all communications in accordance with ISO 15118-20. While the use of TLS is recommended in ISO 15118-2, it is required in the ISO 15118-20 revision. TLS should be implemented with certificate chaining. For additional information, please contact the International Electrotechnical Commission https://www.iec.ch/contact .

History

Mon, 03 Nov 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 03 Nov 2025 10:45:00 +0000

Type Values Removed Values Added
First Time appeared Iec
Iec ev Car Chargers
Vendors & Products Iec
Iec ev Car Chargers

Fri, 31 Oct 2025 15:45:00 +0000

Type Values Removed Values Added
Description By manipulating the Signal Level Attenuation Characterization (SLAC) protocol with spoofed measurements, an attacker can stage a man-in-the-middle attack between an electric vehicle and chargers that comply with the ISO 15118-2 part. This vulnerability may be exploitable wirelessly, within close proximity, via electromagnetic induction.
Title International Standards Organization ISO 15118-2 Improper Restriction of Communication Channel to Intended Endpoints
Weaknesses CWE-923
References
Metrics cvssV3_1

{'score': 8.3, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:H'}

cvssV4_0

{'score': 7.2, 'vector': 'CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-11-03T19:01:59.520Z

Reserved: 2025-10-27T16:05:18.413Z

Link: CVE-2025-12357

cve-icon Vulnrichment

Updated: 2025-11-03T19:01:56.748Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-10-31T16:15:38.847

Modified: 2025-11-04T15:41:31.450

Link: CVE-2025-12357

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-11-03T10:43:52Z

Weaknesses