CVE-2025-12357

By manipulating the Signal Level Attenuation Characterization (SLAC) 
protocol with spoofed measurements, an attacker can stage a 
man-in-the-middle attack between an electric vehicle and chargers that 
comply with the ISO 15118-2 part. This vulnerability may be exploitable 
wirelessly, within close proximity, via electromagnetic induction.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
8.3 HIGH
ADJACENT_NETWORK
LOW
NONE
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:H
icscertCNA
8.3 HIGH
ADJACENT_NETWORK
LOW
NONE
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:H