Skip to main content

Traffic control systems ‘vulnerable to hacking’

Devices used by traffic control systems are vulnerable to being hacked, according to computer security specialist IOActive. Hackers could gain complete control of these devices and cause traffic issues for the cities in the US, UK, France, Australia, China and beyond.
May 1, 2014 Read time: 2 mins
Devices used by traffic control systems are vulnerable to being hacked, according to computer security specialist IOActive. Hackers could gain complete control of these devices and cause traffic issues for the cities in the US, UK, France, Australia, China and beyond.

IOActive researcher CESAR Cerrudo, who examined the systems, said the hackers would not target the traffic lights directly but rather magnetic sensors embedded in streets that feed data to traffic control systems.

Cerrudo found that the systems lack basic security protections, such as data encryption and authentication, allowing the data to be monitored, or, theoretically, replaced with false information. So, although an attacker can’t control traffic signals directly through the sensors, he might be able to fool the control systems into reading congested roadways as clear or free-running roadways as congested, causing traffic signals to respond accordingly.

By exploiting the vulnerabilities he found, Cerrudo feels an attacker could cause traffic jams and problems at intersections, on freeways, highways and other areas.

Depending on the configuration it is possible to make traffic lights stay green for more or less time, stay red and not change to green or flash. Electronic signs could display incorrect speed limits and instructions, while ramp meters could allow cars on the freeway faster or slower than needed.  

Although manual overrides and secondary controls can be used if anomalies are detected, Cerrudo said the possibility of a real attack shouldn’t be disregarded as launching an attack is simple. Making an attack have a bigger impact would be more complex but not impossible.

Cerrudo said the vendor had been contacted in September 2013 through the 1742 Department of Homeland Security’s ICS-CERT. “I was told by ICS-CERT that the vendor said they didn't think the issues were either critical or even important.”

Regarding one of the vulnerabilities, the unnamed vendor is reported to have said the devices were designed that way as customers (state/city governments) wanted them to work that way and they were working as designed, so there wasn't a security issue.
“Yes that was the answer, I couldn't believe it,” he said.

His findings will be presented to the forthcoming Infiltrate conference in Florida.

For more information on companies in this article

Related Content

  • Flexible, demand-based parking charges ease parking problems
    April 10, 2012
    Innovative parking initiatives on the US Pacific Coast. David Crawford reviews. Californian cities are leading the way in trialling new solutions to their endemic parking problems. According to Donald Shoup, a professor of urban planning at the University of California in Los Angeles, drivers looking for available spots can cause up to 74% of traffic congestion in downtown areas. One solution is variable, demand-responsive pricing of parking.
  • Tributes paid to IRD founder Art Bergan
    May 29, 2025
    Bergan developed one of world's first WiM systems in 1970s
  • An honest relationship
    July 19, 2012
    Consider this: "the most important reform should be that of speed limits and the criteria by which they are set". And this: "a successful road safety solution reduces casualties and catches few people because offence rates are so low". Both statements come from the article on pages 28-30 of this issue on business models for automated enforcement. Both come from established figures in the field (respectively, Paolo Sodi of Sodi Scientifica and Geoff Collins of Speed Check Services); and both highlight the ya
  • Coded exchanges
    July 24, 2012
    For many, Ethernet- and IP-based networks are the cast-iron solution to ITS's communications needs. However, there remain issues from manufacturer to manufacturer with interpretation of what are supposed to be common standards The 'promise' of Ethernet was that different devices such as IP video cameras and traffic signals could be easily integrated into communications networks, simplifying the process of transporting data over copper, fibre or wirelessly. However, although Ethernet devices have come to pre