Trend Micro Senior Threat Researcher Salvatore Gariuolo joined the Nexus Podcast, calling int question whether the ISO 15188 standard is sufficient enough to protect EV charging—the cybersecurity of charging stations in particular.
Internet of Things
Vulnerability Management
Risk Management

Nexus Podcast: Salvatore Gariuolo on ISO 15118, Safe EV Charging

Michael Mimoso
/
Aug 18, 2025

Subscribe and listen to the Nexus podcast on your favorite platform.

The ISO 15118 standard is quickly reshaping the EV charging ecosystem, especially from a point of view of making the electric grid more efficient, and handling the increased load as more chargers and electric vehicles join the grid. 

The standard also addresses cybersecurity, in particular communication between the car and charging stations. It protects against unauthorized charging sessions and introduces PKI and digital certificates to verify identities. Transport layer security (TLS) is also a recommendation in the standard and prevents the manipulation of data as it’s exchanged between vehicles and chargers. 

At the recent Black Hat USA conference, however, Trend Micro Senior Threat Researcher Salvatore Gariuolo joined the Nexus Podcast and called into question whether the standard is sufficient enough to protect EV charging—charging stations in particular. 

“We have to focus on the risks that the standard leaves behind, and this is a particularly important focus for cybersecurity,” Gariuolo said. “For example, with the introduction of the standard, we might protect the communication between the EV and the charging station. But at the same time, if we leave the charging station exposed, it will still be possible for malicious users to carry out a denial of service, for example.”

Charging Stations a Vulnerable Cyber-Physical System

Gariuolo said charging stations remain the most vulnerable part of the EV infrastructure, and this is in spite of the fact that most attacks would require physical access to the station. Most, as he points out, however, are unguarded. 

“The most impactful attack is on the infrastructure. So that's the place where the most significant risks lie,” he said. “But at the same time, even the EVs are at risk. And this is because the charging stations are separate physical systems. So this means that an attack on the EV charging ecosystem doesn't only affect the digital space. It also has an effect on our real life.”

Gariuolo said a compromised charging station could deliver unsafe power levels to the car, and put the car and driver at risk if, for example, the battery is damaged. 

“This is particularly dangerous because, first of all, it can put at risk the components in the electric vehicles, like the battery. But this can also create safety hazards for the user,” Gariuolo said. “Imagine having an electric vehicle on fire because of these attacks.”

ISO 15188 Makes a ‘Dangerous’ Assumption

Gariuolo points out that ISO 15188 does not consider the protection of the charging station. 

“The charging station is by design out of the focus of the ISO standard,” he said. “The standard makes an assumption and it’s a very dangerous assumption, that the charging stations are secure entities. This is an assumption that can backfire.” 

Gariuolo added that vulnerabilities at charging stations have the potential to undermine the security the standard aims to enforce. One example: since ISO 15188 does not include a mechanism for stations to synchronize their clocks with trusted time sources, an attacker could modify the station’s clock and force it to accept revoked or expired digital certifications. 

Given the nascent nature of this ecosystem, charging station manufacturers must come to the cybersecurity table, as do e-mobility service providers and car manufacturers. Stations, he said, need tamper-resistant hardware to prevent physical attacks, intrusion detection capabilities to monitor whether a station has been compromised, and a mechanism to validate the integrity of software and whether it has been modified.” 

“The charging station is believed to be trusted, it is not,” he said.

Internet of Things
Vulnerability Management
Risk Management
Michael Mimoso
Editorial Director

Michael Mimoso is Director of Influencer Marketing at Claroty and Editorial Director of Nexus.

Stay in the know Get the Nexus Connect Newsletter
You might also like… Read more
Latest on Nexus Podcast