Description
By manipulating the Signal Level Attenuation Characterization (SLAC) protocol with spoofed measurements, an attacker can stage a man-in-the-middle attack between an electric vehicle and chargers that comply with the ISO 15118-2 part. This vulnerability may be exploitable wirelessly, within close proximity, via electromagnetic induction.
Problem types
Product status
Part 15118-2 Network and Application Protocol Requirements
Credits
Mark I. Johnson of Southwest Research Institute reported this vulnerability to CISA.
References
www.cisa.gov/news-events/ics-advisories/icsa-25-303-01
github.com/...p/csaf_files/OT/white/2025/icsa-25-303-01.json