Skip to main content

Traffic control systems ‘vulnerable to hacking’

Devices used by traffic control systems are vulnerable to being hacked, according to computer security specialist IOActive. Hackers could gain complete control of these devices and cause traffic issues for the cities in the US, UK, France, Australia, China and beyond.
May 1, 2014 Read time: 2 mins
Devices used by traffic control systems are vulnerable to being hacked, according to computer security specialist IOActive. Hackers could gain complete control of these devices and cause traffic issues for the cities in the US, UK, France, Australia, China and beyond.

IOActive researcher CESAR Cerrudo, who examined the systems, said the hackers would not target the traffic lights directly but rather magnetic sensors embedded in streets that feed data to traffic control systems.

Cerrudo found that the systems lack basic security protections, such as data encryption and authentication, allowing the data to be monitored, or, theoretically, replaced with false information. So, although an attacker can’t control traffic signals directly through the sensors, he might be able to fool the control systems into reading congested roadways as clear or free-running roadways as congested, causing traffic signals to respond accordingly.

By exploiting the vulnerabilities he found, Cerrudo feels an attacker could cause traffic jams and problems at intersections, on freeways, highways and other areas.

Depending on the configuration it is possible to make traffic lights stay green for more or less time, stay red and not change to green or flash. Electronic signs could display incorrect speed limits and instructions, while ramp meters could allow cars on the freeway faster or slower than needed.  

Although manual overrides and secondary controls can be used if anomalies are detected, Cerrudo said the possibility of a real attack shouldn’t be disregarded as launching an attack is simple. Making an attack have a bigger impact would be more complex but not impossible.

Cerrudo said the vendor had been contacted in September 2013 through the 1742 Department of Homeland Security’s ICS-CERT. “I was told by ICS-CERT that the vendor said they didn't think the issues were either critical or even important.”

Regarding one of the vulnerabilities, the unnamed vendor is reported to have said the devices were designed that way as customers (state/city governments) wanted them to work that way and they were working as designed, so there wasn't a security issue.
“Yes that was the answer, I couldn't believe it,” he said.

His findings will be presented to the forthcoming Infiltrate conference in Florida.

For more information on companies in this article

Related Content

  • The growth of ITS service solutions providers
    July 26, 2012
    Econolite's new subsidiary Aegis ITS has been set up to address the increasingly complex and exacting needs of agencies in the ITS sector. Chief Operating Officer Doug Terry talks about the evolution to service solution provider. A few very notable and honourable exceptions notwithstanding, it is these days becoming increasingly rare to find a public agency which develops its own traffic management systems. Indeed, most now rely on specialist manufacturers and suppliers to fulfil their needs. This has the h
  • How to win over car owners to public transit
    February 16, 2021
    Public transportation agencies need to look at what private sector firms like Amazon and Netflix have offered their customers, argues Bonnie Crawford of Cubic Transportation Systems
  • Jenoptik supplies sophisticated multi-section control project
    November 17, 2014
    Efficient speed enforcement in the most highly frequented tunnel in Austria on the A7 near Linz. The Bindermichl-Niedernhart tunnel complex on Austrian highway A7 connects the major east/west A1 route from Vienna/ Bratislava to Munich/Salzburg with the A7/ E55 running south from Prague in the Czech Republic. This happens right in the middle of the city of Linz, Austria.
  • Japan looking at technology to prevent hacking of self-driving cars
    August 24, 2015
    According to the Japan Times, Japan’s Internal Affairs and Communications Ministry is concerned about the possibility that a cyber attack on self-driving car systems might lead to traffic accidents. It has drawn up guidelines in a bid to defend against the hacking of a proposed next-generation driving support system that aims to help accelerate the development of autonomous driving cars. The ITS (Intelligent Transport Systems) Connect Promotion Consortium, which is made up of automakers and electronics-m