🔐 CVE Alert

CVE-2025-12357

MEDIUM 6.3

International Standards Organization ISO 15118-2 Improper Restriction of Communication Channel to Intended Endpoints

CVSS Score
6.3
EPSS Score
0.0%
EPSS Percentile
0th

By manipulating the Signal Level Attenuation Characterization (SLAC) protocol with spoofed measurements, an attacker can stage a man-in-the-middle attack between an electric vehicle and chargers that comply with the ISO 15118-2 part. This vulnerability may be exploitable wirelessly, within close proximity, via electromagnetic induction.

CWE CWE-923
Vendor iso 15118-2 network and application protocol requirements
Product ev car chargers
Published Oct 31, 2025
Last Updated Mar 18, 2026
Stay Ahead of the Next One

Get instant alerts for iso 15118-2 network and application protocol requirements ev car chargers

Be the first to know when new medium vulnerabilities affecting iso 15118-2 network and application protocol requirements ev car chargers are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Attack Vector
Adjacent
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
Low

Affected Versions

ISO 15118-2 Network and Application Protocol Requirements / EV Car Chargers
Part 15118-2 Network and Application Protocol Requirements

References

NVD ↗ CVE.org ↗ EPSS Data ↗
iec.ch: https://www.iec.ch/contact?id=40499 cisa.gov: https://www.cisa.gov/news-events/ics-advisories/icsa-25-303-01 github.com: https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2025/icsa-25-303-01.json

Credits

Mark I. Johnson of Southwest Research Institute reported this vulnerability to CISA. Sébastien Dudek of Penthertz disclosed this vulnerability publicly. Jean-Christophe Delaunay and Vincent Fargues of Synacktiv disclosed this vulnerability publicly.