Skip to main content

Traffic control systems ‘vulnerable to hacking’

Devices used by traffic control systems are vulnerable to being hacked, according to computer security specialist IOActive. Hackers could gain complete control of these devices and cause traffic issues for the cities in the US, UK, France, Australia, China and beyond.
May 1, 2014 Read time: 2 mins
Devices used by traffic control systems are vulnerable to being hacked, according to computer security specialist IOActive. Hackers could gain complete control of these devices and cause traffic issues for the cities in the US, UK, France, Australia, China and beyond.

IOActive researcher CESAR Cerrudo, who examined the systems, said the hackers would not target the traffic lights directly but rather magnetic sensors embedded in streets that feed data to traffic control systems.

Cerrudo found that the systems lack basic security protections, such as data encryption and authentication, allowing the data to be monitored, or, theoretically, replaced with false information. So, although an attacker can’t control traffic signals directly through the sensors, he might be able to fool the control systems into reading congested roadways as clear or free-running roadways as congested, causing traffic signals to respond accordingly.

By exploiting the vulnerabilities he found, Cerrudo feels an attacker could cause traffic jams and problems at intersections, on freeways, highways and other areas.

Depending on the configuration it is possible to make traffic lights stay green for more or less time, stay red and not change to green or flash. Electronic signs could display incorrect speed limits and instructions, while ramp meters could allow cars on the freeway faster or slower than needed.  

Although manual overrides and secondary controls can be used if anomalies are detected, Cerrudo said the possibility of a real attack shouldn’t be disregarded as launching an attack is simple. Making an attack have a bigger impact would be more complex but not impossible.

Cerrudo said the vendor had been contacted in September 2013 through the 1742 Department of Homeland Security’s ICS-CERT. “I was told by ICS-CERT that the vendor said they didn't think the issues were either critical or even important.”

Regarding one of the vulnerabilities, the unnamed vendor is reported to have said the devices were designed that way as customers (state/city governments) wanted them to work that way and they were working as designed, so there wasn't a security issue.
“Yes that was the answer, I couldn't believe it,” he said.

His findings will be presented to the forthcoming Infiltrate conference in Florida.

Related Content

  • March 1, 2013
    Airborne traffic monitoring - the future?
    A new frontier in the quest to monitor road traffic is opening up… but using airborne drones to reduce the jams comes with some thorny issues. Chris Tindall reports. Imagine if you could rely on a system that provided all the data you needed to regulate traffic flow, route vehicles and respond swiftly to emergencies for a fraction of the cost of piloting a helicopter. That system exists, but as engineers and traffic managers start to explore the potential of unmanned aerial vehicles (UAVs) – more commonly k
  • July 20, 2012
    Developments in security for wireless communications networks
    David Crawford looks at new developments in security for wireless communications networks. Wireless communications - including mobile phone links - are well recognised as a key transport technology. They are low-cost, easily installed, well supported by the wider IT industry and offer the protocols of choice for much metropolitan area networking on which transport applications can piggyback.
  • August 5, 2022
    Peter Norton: “My fear is that the technology itself is mistaken for the answer”
    Peter Norton, author of Autonorama, tells Adam Hill why automakers kept the consumer dissatisfied, why Futurama got such a hold on the public imagination – and about how active travel can be promoted
  • April 7, 2014
    America fires V2V starting gun
    Leo McCloskey, ITS America’s senior vice president for Technical Programs, talks to Jason Barnes about what the recent NHTSA ruling on light vehicle connectivity means for cooperative infrastructures in North America. In early February the US Department of Transportation’s (USDOT’s) National Highway Traffic Safety Administration (NHTSA) announced it had decided to start taking steps to enable Vehicle-to-Vehicle (V2V) communication technology for light vehicles. In so doing, the many safety-related applicati