Skip to main content

Traffic control systems ‘vulnerable to hacking’

Devices used by traffic control systems are vulnerable to being hacked, according to computer security specialist IOActive. Hackers could gain complete control of these devices and cause traffic issues for the cities in the US, UK, France, Australia, China and beyond.
May 1, 2014 Read time: 2 mins
Devices used by traffic control systems are vulnerable to being hacked, according to computer security specialist IOActive. Hackers could gain complete control of these devices and cause traffic issues for the cities in the US, UK, France, Australia, China and beyond.

IOActive researcher CESAR Cerrudo, who examined the systems, said the hackers would not target the traffic lights directly but rather magnetic sensors embedded in streets that feed data to traffic control systems.

Cerrudo found that the systems lack basic security protections, such as data encryption and authentication, allowing the data to be monitored, or, theoretically, replaced with false information. So, although an attacker can’t control traffic signals directly through the sensors, he might be able to fool the control systems into reading congested roadways as clear or free-running roadways as congested, causing traffic signals to respond accordingly.

By exploiting the vulnerabilities he found, Cerrudo feels an attacker could cause traffic jams and problems at intersections, on freeways, highways and other areas.

Depending on the configuration it is possible to make traffic lights stay green for more or less time, stay red and not change to green or flash. Electronic signs could display incorrect speed limits and instructions, while ramp meters could allow cars on the freeway faster or slower than needed.  

Although manual overrides and secondary controls can be used if anomalies are detected, Cerrudo said the possibility of a real attack shouldn’t be disregarded as launching an attack is simple. Making an attack have a bigger impact would be more complex but not impossible.

Cerrudo said the vendor had been contacted in September 2013 through the 1742 Department of Homeland Security’s ICS-CERT. “I was told by ICS-CERT that the vendor said they didn't think the issues were either critical or even important.”

Regarding one of the vulnerabilities, the unnamed vendor is reported to have said the devices were designed that way as customers (state/city governments) wanted them to work that way and they were working as designed, so there wasn't a security issue.
“Yes that was the answer, I couldn't believe it,” he said.

His findings will be presented to the forthcoming Infiltrate conference in Florida.

For more information on companies in this article

Related Content

  • EMV Transport Forum launched
    November 18, 2014
    The first of the EMV Transport Forum meetings will be held at Transport Ticketing & Passenger Information Global 2015, the world’s largest gathering of the public transport industry for smart fare collection and passenger services, on 29 January at the Lancaster in London. The EMV Transport Forum is the UK’s first industry collaboration focusing directly on aspects of implementation and market adoption of EMV transport ticketing. With the discussion shaped by pre-submitted concerns and questions, the
  • The twisting path to enforcement’s future
    June 5, 2014
    Survey reveals some division of views about enforcement’s future as Colin Sowman discovers. Technological advances and legislative changes pose many questions for those involved in road enforcement, ranging from the changing demands of privacy and data protection legislation to the practicalities on multi-speed enforcement. So to get the industry’s views ITS International took soundings on some of these bigger questions. In a world where many vehicles are fitted with GPS linked ‘black box’ telematics system
  • A new direction for the future of mobility?
    August 14, 2013
    Tesla and SpaceX CEO Elon Musk has unveiled his vision of a futuristic Hyperloop transport system this week, proposing to build a solar-powered network of crash-proof capsules that would whisk people from San Francisco to Los Angeles in half an hour. Musk says the Hyperloop is expected to be a closed-tube transport system not unlike the pneumatic delivery systems found in some old buildings, which use a pulse of air to move a capsule and cargo to a designated location. Based on what he has revealed to date,
  • SafeRide and Irdeto partner on cybersecurity for C/AVs
    June 8, 2018
    Cybersecurity company SafeRide Technologies Ltd and Dutch firm Irdeto have launched a solution to help original equipment manufacturers and Tier-1 suppliers protect connected and autonomous vehicles (C/AVs). Called Vsentry, the device combines network security with software security of the engine control unit to allow users to detect anomalies and respond to attacks. Vsentry uses an artificial intelligence engine and provides multi-layer protection for securing the connectivity perimeter and the in-vehi