By manipulating the Signal Level Attenuation Characterization (SLAC) 
protocol with spoofed measurements, an attacker can stage a 
man-in-the-middle attack between an electric vehicle and chargers that 
comply with the ISO 15118-2 part. This vulnerability may be exploitable 
wirelessly, within close proximity, via electromagnetic induction.
                
            Metrics
Affected Vendors & Products
References
        History
                    Mon, 03 Nov 2025 19:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | 
        
        ssvc
         
  | 
Mon, 03 Nov 2025 10:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | 
        
        Iec
         Iec ev Car Chargers  | 
|
| Vendors & Products | 
        
        Iec
         Iec ev Car Chargers  | 
Fri, 31 Oct 2025 15:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | By manipulating the Signal Level Attenuation Characterization (SLAC) protocol with spoofed measurements, an attacker can stage a man-in-the-middle attack between an electric vehicle and chargers that comply with the ISO 15118-2 part. This vulnerability may be exploitable wirelessly, within close proximity, via electromagnetic induction. | |
| Title | International Standards Organization ISO 15118-2 Improper Restriction of Communication Channel to Intended Endpoints | |
| Weaknesses | CWE-923 | |
| References | 
         | |
| Metrics | 
        
        cvssV3_1
         
 
  | 
Status: PUBLISHED
Assigner: icscert
Published: 2025-10-31T15:33:48.343Z
Updated: 2025-11-03T19:01:59.520Z
Reserved: 2025-10-27T16:05:18.413Z
Link: CVE-2025-12357
Updated: 2025-11-03T19:01:56.748Z
Status : Received
Published: 2025-10-31T16:15:38.847
Modified: 2025-10-31T16:15:38.847
Link: CVE-2025-12357
No data.