International Standards Organization ISO 15118-2 (Update A)
ISO 15118-2 does not mandate encryption for network communications between electric vehicles and charging equipment. This allows man-in-the-middle attacks where an attacker on the local network can intercept, read, or modify charging session messages. ISO 15118-20 revision addresses this by making TLS encryption mandatory, but the current ISO 15118-2 standard only recommends TLS without enforcement. Devices implementing this standard without additional encryption are vulnerable to traffic inspection and modification attacks during EV charging sessions.
- Network access to the communication path between EV charger and vehicle
- Presence on the local network segment or ability to ARP spoof/intercept traffic
- Devices using ISO 15118-2 without additional TLS implementation
Patching may require device reboot — plan for process interruption
/api/v1/advisories/e40d5096-8319-44e9-8ee5-d4b1fe06ea55Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.