CVE-2025-12357
By manipulating the Signal Level Attenuation Characterization (SLAC)
protocol with spoofed measurements, an attacker can stage a
man-in-the-middle attack between an electric vehicle and chargers that
comply with the ISO 15118-2 part. This vulnerability may be exploitable
wirelessly, within close proximity, via electromagnetic induction.
protocol with spoofed measurements, an attacker can stage a
man-in-the-middle attack between an electric vehicle and chargers that
comply with the ISO 15118-2 part. This vulnerability may be exploitable
wirelessly, within close proximity, via electromagnetic induction.
Vendor
-
Product
-
CWE
Yayın Tarihi
2025-10-31 16:15:38
Güncelleme
2026-03-17 17:16:13
Source Identifier
ics-cert@hq.dhs.gov
KEV Date Added
-