Skip to main content

Traffic control systems ‘vulnerable to hacking’

Devices used by traffic control systems are vulnerable to being hacked, according to computer security specialist IOActive. Hackers could gain complete control of these devices and cause traffic issues for the cities in the US, UK, France, Australia, China and beyond.
May 1, 2014 Read time: 2 mins
Devices used by traffic control systems are vulnerable to being hacked, according to computer security specialist IOActive. Hackers could gain complete control of these devices and cause traffic issues for the cities in the US, UK, France, Australia, China and beyond.

IOActive researcher CESAR Cerrudo, who examined the systems, said the hackers would not target the traffic lights directly but rather magnetic sensors embedded in streets that feed data to traffic control systems.

Cerrudo found that the systems lack basic security protections, such as data encryption and authentication, allowing the data to be monitored, or, theoretically, replaced with false information. So, although an attacker can’t control traffic signals directly through the sensors, he might be able to fool the control systems into reading congested roadways as clear or free-running roadways as congested, causing traffic signals to respond accordingly.

By exploiting the vulnerabilities he found, Cerrudo feels an attacker could cause traffic jams and problems at intersections, on freeways, highways and other areas.

Depending on the configuration it is possible to make traffic lights stay green for more or less time, stay red and not change to green or flash. Electronic signs could display incorrect speed limits and instructions, while ramp meters could allow cars on the freeway faster or slower than needed.  

Although manual overrides and secondary controls can be used if anomalies are detected, Cerrudo said the possibility of a real attack shouldn’t be disregarded as launching an attack is simple. Making an attack have a bigger impact would be more complex but not impossible.

Cerrudo said the vendor had been contacted in September 2013 through the 1742 Department of Homeland Security’s ICS-CERT. “I was told by ICS-CERT that the vendor said they didn't think the issues were either critical or even important.”

Regarding one of the vulnerabilities, the unnamed vendor is reported to have said the devices were designed that way as customers (state/city governments) wanted them to work that way and they were working as designed, so there wasn't a security issue.
“Yes that was the answer, I couldn't believe it,” he said.

His findings will be presented to the forthcoming Infiltrate conference in Florida.

For more information on companies in this article

Related Content

  • Hayden AI’s Renee Autumn Ray: ‘It’s about problem solving’
    December 6, 2022
    Renee Autumn Ray is senior director of global strategy for Hayden AI. She has also admitted to impostor syndrome, has no time for people who scorn the public sector and offers one simple rule about social media. Adam Hill meets her to find out what that is, among other things
  • US and UK Respondents call for stricter data security regulations for Connected Cars
    November 28, 2017
    Over 40% of both 1,000 US and UK adult consumers who took part in a new study feel that the government should apply stricter data security regulations for connected cars (CCs), according to Thales’ E-Security IoT Survey. A combined 60% of both respondents believe that CCs pose security concerns with integrity and malfunctions at the top of the list of apprehensions when asked to identify internet-connected devices which they felt were most vulnerable to hacking.
  • Reducing injuries and deaths in US workzones shouldn’t be this complicated
    April 17, 2023
    In National Work Zone Awareness Week, surely the least we can do is to help get road workers home safely at the end of the day, says One.network's boss
  • Tollers make way as NextNav muscles into 902-928MHz spectrum
    July 30, 2013
    Toll operators and Progeny trade claim and counter claim about the potential ramifications of operating in the 902-928MHz spectrum, as Jon Masters finds out. Two months after the Federal Communications Commission (FCC) determined that Progeny can start commercial operation of its NextNav location finding service, the dust has begun to settle. The tolling industry has had a chance to reflect on how this may impact its operations, in the knowledge that NextNav will share the 902-928MHz frequency band with RFI