CVE-2025-12357
📋 TL;DR
This vulnerability allows attackers to perform man-in-the-middle attacks between electric vehicles and ISO 15118-2 compliant chargers by manipulating the SLAC protocol with spoofed measurements. Attackers can intercept and potentially modify charging communications wirelessly within close proximity via electromagnetic induction. This affects electric vehicle charging infrastructure using ISO 15118-2 protocol implementations.
💻 Affected Systems
- Electric vehicle charging stations implementing ISO 15118-2 protocol
- Electric vehicles with ISO 15118-2 compliant charging systems
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of charging sessions allowing attackers to intercept sensitive data, manipulate billing information, disrupt charging operations, or potentially cause physical damage through improper charging parameters.
Likely Case
Interception of charging session data, manipulation of charging parameters, billing fraud, and disruption of charging services.
If Mitigated
Limited impact with proper network segmentation, monitoring, and physical security controls in place to detect and prevent unauthorized proximity access.
🎯 Exploit Status
Exploitation requires specialized RF equipment and proximity to charging equipment. Attack surface is limited to wireless charging communication range.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Not available - protocol-level vulnerability
Vendor Advisory: https://www.cisa.gov/news-events/ics-advisories/icsa-25-303-01
Restart Required: No
Instructions:
Contact charging equipment manufacturers for guidance. Monitor for ISO 15118 protocol updates and vendor-specific mitigations.
🔧 Temporary Workarounds
Physical security controls
allImplement physical security measures to prevent unauthorized proximity to charging equipment
Network segmentation
allIsolate charging infrastructure networks from critical business networks
🧯 If You Can't Patch
- Implement strict physical access controls around charging stations
- Deploy network monitoring to detect anomalous charging communications
🔍 How to Verify
Check if Vulnerable:
Check if charging equipment uses ISO 15118-2 protocol. Consult manufacturer documentation or contact vendor directly.
Check Version:
Manufacturer-specific commands vary. Consult equipment documentation or vendor support.
Verify Fix Applied:
Verify with equipment manufacturers about protocol implementation updates or security enhancements.
📡 Detection & Monitoring
Log Indicators:
- Unusual charging session patterns
- Multiple failed authentication attempts
- Unexpected protocol errors
Network Indicators:
- Anomalous RF signals near charging equipment
- Unexpected protocol messages in charging communications
SIEM Query:
Search for: charging_session_anomalies OR protocol_violations WHERE device_type='ev_charger'