Skip to main content

Traffic control systems ‘vulnerable to hacking’

Devices used by traffic control systems are vulnerable to being hacked, according to computer security specialist IOActive. Hackers could gain complete control of these devices and cause traffic issues for the cities in the US, UK, France, Australia, China and beyond.
May 1, 2014 Read time: 2 mins
Devices used by traffic control systems are vulnerable to being hacked, according to computer security specialist IOActive. Hackers could gain complete control of these devices and cause traffic issues for the cities in the US, UK, France, Australia, China and beyond.

IOActive researcher CESAR Cerrudo, who examined the systems, said the hackers would not target the traffic lights directly but rather magnetic sensors embedded in streets that feed data to traffic control systems.

Cerrudo found that the systems lack basic security protections, such as data encryption and authentication, allowing the data to be monitored, or, theoretically, replaced with false information. So, although an attacker can’t control traffic signals directly through the sensors, he might be able to fool the control systems into reading congested roadways as clear or free-running roadways as congested, causing traffic signals to respond accordingly.

By exploiting the vulnerabilities he found, Cerrudo feels an attacker could cause traffic jams and problems at intersections, on freeways, highways and other areas.

Depending on the configuration it is possible to make traffic lights stay green for more or less time, stay red and not change to green or flash. Electronic signs could display incorrect speed limits and instructions, while ramp meters could allow cars on the freeway faster or slower than needed.  

Although manual overrides and secondary controls can be used if anomalies are detected, Cerrudo said the possibility of a real attack shouldn’t be disregarded as launching an attack is simple. Making an attack have a bigger impact would be more complex but not impossible.

Cerrudo said the vendor had been contacted in September 2013 through the 1742 Department of Homeland Security’s ICS-CERT. “I was told by ICS-CERT that the vendor said they didn't think the issues were either critical or even important.”

Regarding one of the vulnerabilities, the unnamed vendor is reported to have said the devices were designed that way as customers (state/city governments) wanted them to work that way and they were working as designed, so there wasn't a security issue.
“Yes that was the answer, I couldn't believe it,” he said.

His findings will be presented to the forthcoming Infiltrate conference in Florida.

Related Content

  • January 13, 2023
    Signal prioritisation as silver bullet
    We can’t keep building roads to solve congestion. But help is available: transit signal prioritisation can easily reduce traffic and bring back riders to mass transit, says Bobby Lee of Lyt
  • February 8, 2017
    American drivers concerned about hacking of autonomous cars, says survey
    An online survey by the University of Michigan Sustainable Worldwide Transportation Department asked American adults about their level of concern with cyber-security of personally owned autonomous vehicles (with and without driver controls) and current conventional vehicles looked at both vehicle security and data privacy. Within vehicle security, the issues examined were hacking vehicles to cause crashes, hacking by terrorists to use the vehicle as a weapon, disabling many vehicles simultaneously and di
  • July 17, 2012
    Taking the long term view to toll safety, adopting new technology
    OmniAir's Tim McGuckin takes a look at what happens when a tolling authority makes safety its principal operating criterion. The bottom - line effects, he says, are not as onerous as one might think. Replacing an existing 915MHz-based Electronic Toll Collection (ETC) system with a new 915MHz system for toll collection is - from a technology standpoint - comparable to trading in your 1999 high-mileage Buick for another 1999 Buick with '0' on the odometer.
  • April 24, 2024
    Flir warms ITS market to thermal detection
    Teledyne Flir will be showcasing its latest thermal detection cameras this week at ITS America in Phoenix. The cameras are set up in the company’s booth, showing how insights such as vehicle classification, speed and trajectory can be layered on top of the thermal images in real time.