Skip to main content

Traffic control systems ‘vulnerable to hacking’

Devices used by traffic control systems are vulnerable to being hacked, according to computer security specialist IOActive. Hackers could gain complete control of these devices and cause traffic issues for the cities in the US, UK, France, Australia, China and beyond.
May 1, 2014 Read time: 2 mins
Devices used by traffic control systems are vulnerable to being hacked, according to computer security specialist IOActive. Hackers could gain complete control of these devices and cause traffic issues for the cities in the US, UK, France, Australia, China and beyond.

IOActive researcher CESAR Cerrudo, who examined the systems, said the hackers would not target the traffic lights directly but rather magnetic sensors embedded in streets that feed data to traffic control systems.

Cerrudo found that the systems lack basic security protections, such as data encryption and authentication, allowing the data to be monitored, or, theoretically, replaced with false information. So, although an attacker can’t control traffic signals directly through the sensors, he might be able to fool the control systems into reading congested roadways as clear or free-running roadways as congested, causing traffic signals to respond accordingly.

By exploiting the vulnerabilities he found, Cerrudo feels an attacker could cause traffic jams and problems at intersections, on freeways, highways and other areas.

Depending on the configuration it is possible to make traffic lights stay green for more or less time, stay red and not change to green or flash. Electronic signs could display incorrect speed limits and instructions, while ramp meters could allow cars on the freeway faster or slower than needed.  

Although manual overrides and secondary controls can be used if anomalies are detected, Cerrudo said the possibility of a real attack shouldn’t be disregarded as launching an attack is simple. Making an attack have a bigger impact would be more complex but not impossible.

Cerrudo said the vendor had been contacted in September 2013 through the 1742 Department of Homeland Security’s ICS-CERT. “I was told by ICS-CERT that the vendor said they didn't think the issues were either critical or even important.”

Regarding one of the vulnerabilities, the unnamed vendor is reported to have said the devices were designed that way as customers (state/city governments) wanted them to work that way and they were working as designed, so there wasn't a security issue.
“Yes that was the answer, I couldn't believe it,” he said.

His findings will be presented to the forthcoming Infiltrate conference in Florida.

For more information on companies in this article

Related Content

  • More than 20 million connected cars with built-in software-based security by 2020
    February 14, 2014
    The findings of ABI Research’s Automotive Safety & Autonomous Driving and Cybersecurity Research Services indicate that while traditional safety telematics services such as eCall, bCall, stolen vehicle tracking, and diagnostics aimed at the physical protection of vehicles, drivers and passengers are becoming main stream, awareness is growing about the threat of cyber-attacks and their impact on the physical integrity of persons, especially with vehicle-to-vehicle communication and autonomous vehicles. This
  • Google’s self-driving cars can ‘exceed the speed limit to aid safety’
    August 20, 2014
    According to Google's lead software engineer, Dmitri Dolgov, the company’s self-driving cars are programmed to stay within the speed limit, mostly. Research shows that sticking to the speed limit when other cars are going much faster actually can be dangerous, Dolgov says, so its autonomous car can go up to 10 mph (16 kph) above the speed limit when traffic conditions warrant. Dolgov told Reuters during a test drive that when surrounding vehicles were breaking the speed limit, going more slowly could act
  • Radar effective as detection tool for hard shoulder running
    July 23, 2012
    Navtech Radar's millimetric-wave systems are being researched on the M42 in England to look into how this type of detector can assist in the opening of the hard shoulder as an additional running lane. Here, the company's Stephen Clark talks about the technology being used. In England, the Highways Agency's (the HA, an executive agency of the Department for Transport) Managed Motorways system - formerly called Active Traffic Management - uses electronic signs and signals mounted on gantries to direct drivers
  • IBTTA Summit: satellite tolling is the future
    August 15, 2019
    IBTTA members met in Florida to consider the technological changes that will impact their businesses – including satellite tolling. Colin Sowman reports from Orlando Over decades, the technology employed in toll collection has been honed to near perfection – automatic number plate recognition (ANPR) and radio frequency identification (RFID) tags are easily within a couple of per cent of infallibility even at highway speeds. However, technical innovations beyond the confines of the toll road cannot b