Skip to main content

Traffic control systems ‘vulnerable to hacking’

Devices used by traffic control systems are vulnerable to being hacked, according to computer security specialist IOActive. Hackers could gain complete control of these devices and cause traffic issues for the cities in the US, UK, France, Australia, China and beyond.
May 1, 2014 Read time: 2 mins
Devices used by traffic control systems are vulnerable to being hacked, according to computer security specialist IOActive. Hackers could gain complete control of these devices and cause traffic issues for the cities in the US, UK, France, Australia, China and beyond.

IOActive researcher CESAR Cerrudo, who examined the systems, said the hackers would not target the traffic lights directly but rather magnetic sensors embedded in streets that feed data to traffic control systems.

Cerrudo found that the systems lack basic security protections, such as data encryption and authentication, allowing the data to be monitored, or, theoretically, replaced with false information. So, although an attacker can’t control traffic signals directly through the sensors, he might be able to fool the control systems into reading congested roadways as clear or free-running roadways as congested, causing traffic signals to respond accordingly.

By exploiting the vulnerabilities he found, Cerrudo feels an attacker could cause traffic jams and problems at intersections, on freeways, highways and other areas.

Depending on the configuration it is possible to make traffic lights stay green for more or less time, stay red and not change to green or flash. Electronic signs could display incorrect speed limits and instructions, while ramp meters could allow cars on the freeway faster or slower than needed.  

Although manual overrides and secondary controls can be used if anomalies are detected, Cerrudo said the possibility of a real attack shouldn’t be disregarded as launching an attack is simple. Making an attack have a bigger impact would be more complex but not impossible.

Cerrudo said the vendor had been contacted in September 2013 through the 1742 Department of Homeland Security’s ICS-CERT. “I was told by ICS-CERT that the vendor said they didn't think the issues were either critical or even important.”

Regarding one of the vulnerabilities, the unnamed vendor is reported to have said the devices were designed that way as customers (state/city governments) wanted them to work that way and they were working as designed, so there wasn't a security issue.
“Yes that was the answer, I couldn't believe it,” he said.

His findings will be presented to the forthcoming Infiltrate conference in Florida.

For more information on companies in this article

Related Content

  • UK Home Office type approval for Truvelo’s D-CAM
    March 21, 2014
    Truvelo UK’s D-CAM digital speed and red light enforcement camera has now gained UK Home Office Type Approval. The camera has been approved for both front and rear photography which, together with choices for the positioning of road markings for secondary speed checks, dramatically increases siting flexibility, as well for as speed on green enforcement. A patented solution which forms a part of the Home Office type approval is the ability to monitor signal phases on newer-generation LED traffic lights.
  • Is Europe's Galileo project value for money?
    February 2, 2012
    Philippe Hamet discusses the progress of the European Union's Galileo Global Navigation Satellite System Project
  • In-vehicle automation of safety compliance and other traffic violations
    January 24, 2012
    David Crawford explores new initiatives in enforcement. Achieving the EU’s new road safety target of reducing road traffic deaths by 50 per cent by 2020 depends on removing legal and institutional barriers to the deployment of new enforcement technologies, stresses Jan Malenstein. The senior ITS Adviser to Dutch National Police Agency the KLPD, and a European-level spokesperson on road and traffic safety, points to the importance of, among other requirements, an effective EUwide type approval process for fr
  • Cybersecurity in the connected car
    March 31, 2017
    A new report by Danish business analysis company Autintelligence, Cybersecurity in the connected car: technology, industry, and future examines the security implications of increasing connectivity and software complexity in connected and autonomous vehicles. According to the report, advanced connectivity, electronics and software are hallmarks of modern vehicles. A typical connected car contains up to 70 ECUs, and about 100 million lines of code. As vehicles expand in terms of technological complexity,