CVE-2025-12357
Awaiting Analysis Awaiting Analysis - Queue
BaseFortify

Publication date: 2025-10-31

Last updated on: 2026-03-17

Assigner: ICS-CERT

Description
By manipulating the Signal Level Attenuation Characterization (SLAC) protocol with spoofed measurements, an attacker can stage a man-in-the-middle attack between an electric vehicle and chargers that comply with the ISO 15118-2 part. This vulnerability may be exploitable wirelessly, within close proximity, via electromagnetic induction.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-10-31
Last Modified
2026-03-17
Generated
2026-05-07
AI Q&A
2025-11-01
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Currently, no data is known.
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-923 The product establishes a communication channel to (or from) an endpoint for privileged or protected operations, but it does not properly ensure that it is communicating with the correct endpoint.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability involves manipulating the Signal Level Attenuation Characterization (SLAC) protocol by using spoofed measurements to stage a man-in-the-middle (MitM) attack between an electric vehicle (EV) and chargers that comply with the ISO 15118-2 standard. The attack can be conducted wirelessly within close proximity via electromagnetic induction, allowing an attacker to intercept or alter communications between the EV and the charger. [2]


How can this vulnerability impact me? :

The vulnerability can allow an attacker to intercept and potentially alter communications between an electric vehicle and its charger, which could lead to unauthorized control or disruption of charging sessions. This could impact the reliability and security of EV charging infrastructure, potentially causing service interruptions or unauthorized access to the charging process. [2]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include implementing Transport Layer Security (TLS) for all communications between electric vehicles and chargers, ensuring proper certificate chaining as recommended in ISO 15118-20 and ISO 15118-2. Additionally, minimize network exposure of control system devices, isolate control system networks behind firewalls, and use secure remote access methods such as updated VPNs. Conduct impact analysis and risk assessments before deploying defenses and follow CISA's recommended cybersecurity best practices for industrial control systems (ICS). [2]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart