| ID |
CVE-2025-12357
|
| Sažetak |
By manipulating the Signal Level Attenuation Characterization (SLAC)
protocol with spoofed measurements, an attacker can stage a
man-in-the-middle attack between an electric vehicle and chargers that
comply with the ISO 15118-2 part. This vulnerability may be exploitable
wirelessly, within close proximity, via electromagnetic induction. |
| Reference |
|
| CVSS |
| Base: | 8.3 |
| Impact: | 5.5 |
| Exploitability: | 2.8 |
|
| Pristup |
| Vektor | Složenost | Autentikacija |
| ADJACENT_NETWORK |
LOW |
NONE |
|
| Impact |
| Povjerljivost | Cjelovitost | Dostupnost |
| HIGH |
LOW |
HIGH |
|
| CVSS vektor |
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:H |
| Zadnje važnije ažuriranje |
31-10-2025 - 16:15 |
| Objavljeno |
31-10-2025 - 16:15 |