CVE-2025-12357
International Standards Organization ISO 15118-2 Improper Restriction of Communication Channel to Intended Endpoints
CVSS Score
6.3
EPSS Score
0.0%
EPSS Percentile
0th
By manipulating the Signal Level Attenuation Characterization (SLAC) protocol with spoofed measurements, an attacker can stage a man-in-the-middle attack between an electric vehicle and chargers that comply with the ISO 15118-2 part. This vulnerability may be exploitable wirelessly, within close proximity, via electromagnetic induction.
| CWE | CWE-923 |
| Vendor | iso 15118-2 network and application protocol requirements |
| Product | ev car chargers |
| Published | Oct 31, 2025 |
| Last Updated | Mar 18, 2026 |
Stay Ahead of the Next One
Get instant alerts for iso 15118-2 network and application protocol requirements ev car chargers
Be the first to know when new medium vulnerabilities affecting iso 15118-2 network and application protocol requirements ev car chargers are published — delivered to Slack, Telegram or Discord.
Get Free Alerts →
Free · No credit card · 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L Attack Vector
Adjacent
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
Low
Affected Versions
ISO 15118-2 Network and Application Protocol Requirements / EV Car Chargers
Part 15118-2 Network and Application Protocol Requirements
References
Credits
Mark I. Johnson of Southwest Research Institute reported this vulnerability to CISA. Sébastien Dudek of Penthertz disclosed this vulnerability publicly. Jean-Christophe Delaunay and Vincent Fargues of Synacktiv disclosed this vulnerability publicly.