CVE-2025-12357
31.10.2025, 16:15
By manipulating the Signal Level Attenuation Characterization (SLAC) protocol with spoofed measurements, an attacker can stage a man-in-the-middle attack between an electric vehicle and chargers that comply with the ISO 15118-2 part. This vulnerability may be exploitable wirelessly, within close proximity, via electromagnetic induction.Enginsight
Awaiting analysis
This vulnerability is currently awaiting analysis.