Skip to main content

Traffic control systems ‘vulnerable to hacking’

Devices used by traffic control systems are vulnerable to being hacked, according to computer security specialist IOActive. Hackers could gain complete control of these devices and cause traffic issues for the cities in the US, UK, France, Australia, China and beyond.
May 1, 2014 Read time: 2 mins
Devices used by traffic control systems are vulnerable to being hacked, according to computer security specialist IOActive. Hackers could gain complete control of these devices and cause traffic issues for the cities in the US, UK, France, Australia, China and beyond.

IOActive researcher CESAR Cerrudo, who examined the systems, said the hackers would not target the traffic lights directly but rather magnetic sensors embedded in streets that feed data to traffic control systems.

Cerrudo found that the systems lack basic security protections, such as data encryption and authentication, allowing the data to be monitored, or, theoretically, replaced with false information. So, although an attacker can’t control traffic signals directly through the sensors, he might be able to fool the control systems into reading congested roadways as clear or free-running roadways as congested, causing traffic signals to respond accordingly.

By exploiting the vulnerabilities he found, Cerrudo feels an attacker could cause traffic jams and problems at intersections, on freeways, highways and other areas.

Depending on the configuration it is possible to make traffic lights stay green for more or less time, stay red and not change to green or flash. Electronic signs could display incorrect speed limits and instructions, while ramp meters could allow cars on the freeway faster or slower than needed.  

Although manual overrides and secondary controls can be used if anomalies are detected, Cerrudo said the possibility of a real attack shouldn’t be disregarded as launching an attack is simple. Making an attack have a bigger impact would be more complex but not impossible.

Cerrudo said the vendor had been contacted in September 2013 through the 1742 Department of Homeland Security’s ICS-CERT. “I was told by ICS-CERT that the vendor said they didn't think the issues were either critical or even important.”

Regarding one of the vulnerabilities, the unnamed vendor is reported to have said the devices were designed that way as customers (state/city governments) wanted them to work that way and they were working as designed, so there wasn't a security issue.
“Yes that was the answer, I couldn't believe it,” he said.

His findings will be presented to the forthcoming Infiltrate conference in Florida.

For more information on companies in this article

Related Content

  • Managed lane operators: meet the CAV pioneers
    June 26, 2018
    There is some controversy over the testing of connected and autonomous vehicles – but Robert Deans of Transurban North America explains how managed lanes could be vital in the development of CAVs, benefiting everyone. Managed lane operators have the opportunity to establish themselves as leaders in the testing and roll-out of connected and automated vehicles (CAVs), assisting and accelerating the transition of CAVs onto road networks to deliver economic and safety benefits. Managed lane facilities
  • Evolving Australia's truck weighing programme
    March 1, 2013
    Regulating heavy truck weight isn’t all about sensors in the road… this year marks a significant point in the progression of Australia’s Intelligent Access Programme as its administrators attempt to answer the scheme’s critics. Jon Masters reports. Australia’s Intelligent Access Programme (IAP), the country’s telematics-based system of reg­ulating movement of the heaviest vehicles, is now five years old. The IAP is administered by Transport Certification Australia (TCA) whose general manager for strategic d
  • Camera technology a flexible and cost-effective option
    June 7, 2012
    Perceptions of machine vision being an expensive solution are being challenged by developments in both core technologies and ancillaries. Here, Jason Barnes and David Crawford look at the latest developments in the sector. A notable aspect of machine vision is the flexibility it offers in terms of how and how much data is passed around a network. With smart cameras, processing capabilities at the front end mean that only that which is valid need be communicated back to a central processor of any descripti
  • Developments in toll interoperability
    July 16, 2012
    The North Carolina Turnpike Authority's JJ Eden talks about developments within the Alliance for Toll Interoperability. The Alliance for Toll Interoperability grew out of the US State of North Carolina's moves to introduce modern, Open Road Tolling (ORT) and the identification of revenue 'holes' when it came to out-of-state customers. Initially, the Alliance looked to achieve some form of common ground when it came to the use of transponders used by different agencies but alighted on video-based tolling as