Skip to main content

Traffic control systems ‘vulnerable to hacking’

Devices used by traffic control systems are vulnerable to being hacked, according to computer security specialist IOActive. Hackers could gain complete control of these devices and cause traffic issues for the cities in the US, UK, France, Australia, China and beyond.
May 1, 2014 Read time: 2 mins
Devices used by traffic control systems are vulnerable to being hacked, according to computer security specialist IOActive. Hackers could gain complete control of these devices and cause traffic issues for the cities in the US, UK, France, Australia, China and beyond.

IOActive researcher CESAR Cerrudo, who examined the systems, said the hackers would not target the traffic lights directly but rather magnetic sensors embedded in streets that feed data to traffic control systems.

Cerrudo found that the systems lack basic security protections, such as data encryption and authentication, allowing the data to be monitored, or, theoretically, replaced with false information. So, although an attacker can’t control traffic signals directly through the sensors, he might be able to fool the control systems into reading congested roadways as clear or free-running roadways as congested, causing traffic signals to respond accordingly.

By exploiting the vulnerabilities he found, Cerrudo feels an attacker could cause traffic jams and problems at intersections, on freeways, highways and other areas.

Depending on the configuration it is possible to make traffic lights stay green for more or less time, stay red and not change to green or flash. Electronic signs could display incorrect speed limits and instructions, while ramp meters could allow cars on the freeway faster or slower than needed.  

Although manual overrides and secondary controls can be used if anomalies are detected, Cerrudo said the possibility of a real attack shouldn’t be disregarded as launching an attack is simple. Making an attack have a bigger impact would be more complex but not impossible.

Cerrudo said the vendor had been contacted in September 2013 through the 1742 Department of Homeland Security’s ICS-CERT. “I was told by ICS-CERT that the vendor said they didn't think the issues were either critical or even important.”

Regarding one of the vulnerabilities, the unnamed vendor is reported to have said the devices were designed that way as customers (state/city governments) wanted them to work that way and they were working as designed, so there wasn't a security issue.
“Yes that was the answer, I couldn't believe it,” he said.

His findings will be presented to the forthcoming Infiltrate conference in Florida.

Related Content

  • January 26, 2012
    IBTTA 2011 Annual Meeting highlights developing trends in tolling
    Alain Estiot, chief meeting organiser of this year's IBTTA Annual Meeting and Exhibition, talks about hot topics for discussion. The IBTTA's 79th Annual Meeting and Exhibition, which takes place this year in Berlin in September, will once again take many of the developing trends from around the world and look at their effects on the tolling sector. Host organisation Toll Collect's Alain Estiot, chief meeting organiser, says that the event has to be viewed against a backdrop of major global change.
  • December 3, 2012
    Machine vision standards definition moves forward with establishment of new forum
    The new Future Standards Forum will homogenise standards develop in the machine vision and partnering sectors. Here, machine vision industry experts discuss developments. By Jason Barnes At the Vision Show, which took place in Stuttgart at the beginning of November, the European Machine Vision Association, the US’s Automated Imaging Association and the Japan Industrial Imaging Association (JIIA) established a joint initiative, the Future Standards Forum (FSF). This, said the EMVA’s President Toni Ventura, a
  • September 8, 2015
    Hackers can fool self-driving car sensors into evasive action
    The laser ranging (LIDAR) systems that most self-driving cars rely on to sense obstacles can be hacked by a setup costing just US$60, a security researcher has told IEEE spectrum. According to Jonathan Petit, principal scientist at software security company Security Innovation, he can take echoes of a fake car, pedestrian or wall and put them in any location. Using such a system, which he designed using a low-power laser and pulse generator, attackers could trick a self-driving car into thinking somethin
  • December 17, 2021
    Amazon keeps its head in the cloud
    The days of Amazon just selling books may be long, long gone – but Randy Iwasaki of Amazon Web Services tells Adam Hill why the ability to tell stories still has an important place in a highly technical transport environment