CVE-2025-12357

8.3 HIGH

📋 TL;DR

This vulnerability allows attackers to perform man-in-the-middle attacks between electric vehicles and ISO 15118-2 compliant chargers by manipulating the SLAC protocol with spoofed measurements. Attackers can intercept and potentially modify charging communications wirelessly within close proximity via electromagnetic induction. This affects electric vehicle charging infrastructure using ISO 15118-2 protocol implementations.

💻 Affected Systems

Products:
  • Electric vehicle charging stations implementing ISO 15118-2 protocol
  • Electric vehicles with ISO 15118-2 compliant charging systems
Versions: All versions implementing ISO 15118-2 protocol
Operating Systems: Embedded systems in charging infrastructure, Vehicle charging control systems
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability affects the ISO 15118-2 protocol implementation itself, not specific vendor implementations. Requires physical proximity to charging equipment.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of charging sessions allowing attackers to intercept sensitive data, manipulate billing information, disrupt charging operations, or potentially cause physical damage through improper charging parameters.

🟠

Likely Case

Interception of charging session data, manipulation of charging parameters, billing fraud, and disruption of charging services.

🟢

If Mitigated

Limited impact with proper network segmentation, monitoring, and physical security controls in place to detect and prevent unauthorized proximity access.

🌐 Internet-Facing: LOW with brief explanation
🏢 Internal Only: HIGH with brief explanation

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires specialized RF equipment and proximity to charging equipment. Attack surface is limited to wireless charging communication range.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not available - protocol-level vulnerability

Vendor Advisory: https://www.cisa.gov/news-events/ics-advisories/icsa-25-303-01

Restart Required: No

Instructions:

Contact charging equipment manufacturers for guidance. Monitor for ISO 15118 protocol updates and vendor-specific mitigations.

🔧 Temporary Workarounds

Physical security controls

all

Implement physical security measures to prevent unauthorized proximity to charging equipment

Network segmentation

all

Isolate charging infrastructure networks from critical business networks

🧯 If You Can't Patch

  • Implement strict physical access controls around charging stations
  • Deploy network monitoring to detect anomalous charging communications

🔍 How to Verify

Check if Vulnerable:

Check if charging equipment uses ISO 15118-2 protocol. Consult manufacturer documentation or contact vendor directly.

Check Version:

Manufacturer-specific commands vary. Consult equipment documentation or vendor support.

Verify Fix Applied:

Verify with equipment manufacturers about protocol implementation updates or security enhancements.

📡 Detection & Monitoring

Log Indicators:

  • Unusual charging session patterns
  • Multiple failed authentication attempts
  • Unexpected protocol errors

Network Indicators:

  • Anomalous RF signals near charging equipment
  • Unexpected protocol messages in charging communications

SIEM Query:

Search for: charging_session_anomalies OR protocol_violations WHERE device_type='ev_charger'

🔗 References

📤 Share & Export