Skip to main content

Traffic control systems ‘vulnerable to hacking’

Devices used by traffic control systems are vulnerable to being hacked, according to computer security specialist IOActive. Hackers could gain complete control of these devices and cause traffic issues for the cities in the US, UK, France, Australia, China and beyond.
May 1, 2014 Read time: 2 mins
Devices used by traffic control systems are vulnerable to being hacked, according to computer security specialist IOActive. Hackers could gain complete control of these devices and cause traffic issues for the cities in the US, UK, France, Australia, China and beyond.

IOActive researcher CESAR Cerrudo, who examined the systems, said the hackers would not target the traffic lights directly but rather magnetic sensors embedded in streets that feed data to traffic control systems.

Cerrudo found that the systems lack basic security protections, such as data encryption and authentication, allowing the data to be monitored, or, theoretically, replaced with false information. So, although an attacker can’t control traffic signals directly through the sensors, he might be able to fool the control systems into reading congested roadways as clear or free-running roadways as congested, causing traffic signals to respond accordingly.

By exploiting the vulnerabilities he found, Cerrudo feels an attacker could cause traffic jams and problems at intersections, on freeways, highways and other areas.

Depending on the configuration it is possible to make traffic lights stay green for more or less time, stay red and not change to green or flash. Electronic signs could display incorrect speed limits and instructions, while ramp meters could allow cars on the freeway faster or slower than needed.  

Although manual overrides and secondary controls can be used if anomalies are detected, Cerrudo said the possibility of a real attack shouldn’t be disregarded as launching an attack is simple. Making an attack have a bigger impact would be more complex but not impossible.

Cerrudo said the vendor had been contacted in September 2013 through the 1742 Department of Homeland Security’s ICS-CERT. “I was told by ICS-CERT that the vendor said they didn't think the issues were either critical or even important.”

Regarding one of the vulnerabilities, the unnamed vendor is reported to have said the devices were designed that way as customers (state/city governments) wanted them to work that way and they were working as designed, so there wasn't a security issue.
“Yes that was the answer, I couldn't believe it,” he said.

His findings will be presented to the forthcoming Infiltrate conference in Florida.

Related Content

  • July 27, 2012
    Give offending drivers credit for good behaviour
    Andrew Rooke and Dave Marples of Technolution B.V. take a look at what can be done to address a long-standing problem: the all-or-nothing approach of automated enforcement. To start, a brief history of speeding: on 14 November 1896, the first Veteran Car Run was staged in England from London to Brighton. It was organised to celebrate new British legislation to raise the maximum speed of vehicles from four to 14mph while also removing the need for a person waving a red flag to walk in front of the car and wa
  • March 18, 2021
    Vivacity demos AI junction control
    How will AI-controlled junctions help smooth the journeys of drivers – and cyclists - in urban areas? Alan Dron looks at an expanding scheme in Manchester, UK, which aims to find out
  • November 14, 2016
    Connected car data – both opportunities and challenges for auto OEMs, says KPMG
    Data collected through connected cars will present automakers with tremendous business opportunities to enhance customer experiences while at the same time also posing inherent risks, according to a new KPMG report, Your Connected Car is Talking: Who's Listening? KPMG's national automotive leader, Gary Silberg, notes that, while OEMs can use data collected through connected vehicles to optimise performance, reliability and safety of vehicles they produce, failure to get cyber-security right could have a
  • January 30, 2012
    Use of ITS technology grows more prevalent in safety applications
    Transportation agencies and governments are using ITS technology to protect critical infrastructure from terrorist attack and other threats to economic security and public safety. Andrew Bardin Williams reports. It is no secret that we live in a potentially dangerous world. Terrorism as seen on 9/11 in the United States, subsequent attacks in London, Moscow and Madrid and other acts of violence across the developing world have made vigilance the watchword for ensuring security. Key infrastructure is now bei