Skip to main content

Traffic control systems ‘vulnerable to hacking’

Devices used by traffic control systems are vulnerable to being hacked, according to computer security specialist IOActive. Hackers could gain complete control of these devices and cause traffic issues for the cities in the US, UK, France, Australia, China and beyond.
May 1, 2014 Read time: 2 mins
Devices used by traffic control systems are vulnerable to being hacked, according to computer security specialist IOActive. Hackers could gain complete control of these devices and cause traffic issues for the cities in the US, UK, France, Australia, China and beyond.

IOActive researcher CESAR Cerrudo, who examined the systems, said the hackers would not target the traffic lights directly but rather magnetic sensors embedded in streets that feed data to traffic control systems.

Cerrudo found that the systems lack basic security protections, such as data encryption and authentication, allowing the data to be monitored, or, theoretically, replaced with false information. So, although an attacker can’t control traffic signals directly through the sensors, he might be able to fool the control systems into reading congested roadways as clear or free-running roadways as congested, causing traffic signals to respond accordingly.

By exploiting the vulnerabilities he found, Cerrudo feels an attacker could cause traffic jams and problems at intersections, on freeways, highways and other areas.

Depending on the configuration it is possible to make traffic lights stay green for more or less time, stay red and not change to green or flash. Electronic signs could display incorrect speed limits and instructions, while ramp meters could allow cars on the freeway faster or slower than needed.  

Although manual overrides and secondary controls can be used if anomalies are detected, Cerrudo said the possibility of a real attack shouldn’t be disregarded as launching an attack is simple. Making an attack have a bigger impact would be more complex but not impossible.

Cerrudo said the vendor had been contacted in September 2013 through the 1742 Department of Homeland Security’s ICS-CERT. “I was told by ICS-CERT that the vendor said they didn't think the issues were either critical or even important.”

Regarding one of the vulnerabilities, the unnamed vendor is reported to have said the devices were designed that way as customers (state/city governments) wanted them to work that way and they were working as designed, so there wasn't a security issue.
“Yes that was the answer, I couldn't believe it,” he said.

His findings will be presented to the forthcoming Infiltrate conference in Florida.

For more information on companies in this article

Related Content

  • Federal Signal supplies all the elements of end to end tolling
    January 31, 2012
    Manfred Rietsch, group president of Federal Signal Technologies (FST), talks about the recent acquisitions forming FST and the organisation's plans for the future. "Our philosophy is going to be about open access" Federal Signal has been on a buying spree. An energetic policy of acquisition over the past few months has seen the company reposition itself as an end-to-end provider of Electronic Toll Collection (ETC) systems with what it states is a portfolio of proven, best-in-class technologies which will al
  • Q-Free sees logic in video tolling
    September 15, 2014
    Q-Free’s Frank Kjelsli talks to Colin Sowman about why video tolling could be the boost to efficiency and interoperability the industry is seeking. Like it or not, the principal of one person, one tolling account is likely to become a reality: be that in America with the 2016 interoperability deadline or the European EETS requirement. Multi-tag readers are being introduced and alliances are being formed to meet legislative requirements but as the debate continues about which systems and protocols to adopt,
  • Road safety systems on show at ITS World Congress
    January 30, 2012
    A vast array of new products and systems for aiding road safety were displayed at the ITS World Congress in October. David Crawford assesses a selection of safety initiatives exhibited in Orlando. Vital roles for ITS applications in road traffic safety emerge clearly from a new report from the US Transportation Safety Advancement Group. The report has been carried out for the Next Generation 911 What's Next Forum, which is preparing the way for future development of the US national 911 emergency single call
  • Cellint measures speed and travel time without roadside infrastructure
    April 10, 2014
    Collecting speed and travel time data without using roadside infrastructure could offer new possibilities to cash-strapped road authorities. Streaming video may be useful for traffic controllers to monitor incidents and automatic number plate recognition may be required for enforcement, but neither are necessary for many ITS functions. For instance travel times, tailbacks, percentage of vehicles turning, origin and destination analysis can all be done using Bluetooth and/or WI-Fi sensors and without video o