Skip to main content

Traffic control systems ‘vulnerable to hacking’

Devices used by traffic control systems are vulnerable to being hacked, according to computer security specialist IOActive. Hackers could gain complete control of these devices and cause traffic issues for the cities in the US, UK, France, Australia, China and beyond.
May 1, 2014 Read time: 2 mins
Devices used by traffic control systems are vulnerable to being hacked, according to computer security specialist IOActive. Hackers could gain complete control of these devices and cause traffic issues for the cities in the US, UK, France, Australia, China and beyond.

IOActive researcher CESAR Cerrudo, who examined the systems, said the hackers would not target the traffic lights directly but rather magnetic sensors embedded in streets that feed data to traffic control systems.

Cerrudo found that the systems lack basic security protections, such as data encryption and authentication, allowing the data to be monitored, or, theoretically, replaced with false information. So, although an attacker can’t control traffic signals directly through the sensors, he might be able to fool the control systems into reading congested roadways as clear or free-running roadways as congested, causing traffic signals to respond accordingly.

By exploiting the vulnerabilities he found, Cerrudo feels an attacker could cause traffic jams and problems at intersections, on freeways, highways and other areas.

Depending on the configuration it is possible to make traffic lights stay green for more or less time, stay red and not change to green or flash. Electronic signs could display incorrect speed limits and instructions, while ramp meters could allow cars on the freeway faster or slower than needed.  

Although manual overrides and secondary controls can be used if anomalies are detected, Cerrudo said the possibility of a real attack shouldn’t be disregarded as launching an attack is simple. Making an attack have a bigger impact would be more complex but not impossible.

Cerrudo said the vendor had been contacted in September 2013 through the 1742 Department of Homeland Security’s ICS-CERT. “I was told by ICS-CERT that the vendor said they didn't think the issues were either critical or even important.”

Regarding one of the vulnerabilities, the unnamed vendor is reported to have said the devices were designed that way as customers (state/city governments) wanted them to work that way and they were working as designed, so there wasn't a security issue.
“Yes that was the answer, I couldn't believe it,” he said.

His findings will be presented to the forthcoming Infiltrate conference in Florida.

For more information on companies in this article

Related Content

  • Rosa Rountree calls for clarity and consistency
    December 16, 2015
    Rosa Rountree campaigns for accurate and consistent figures for the tendering of tolling concessions. If there is one thing about which Rosa Rountree is passionate, it’s numbers. That’s not surprising for a graduate accountant, but it is not only the quarterly accounts that concern the CEO and president of Egis Projects USA.
  • Econolite shares tips to get C/AV-ready
    August 24, 2022
    As more tech-based ATMS and sensors come online, how do we make these technologies functional and practical in existing infrastructure - particularly for data-hungry C/AV systems? Sunny Chakravarty and Dustin DeVoe of Econolite have some ideas
  • Go Denver opens up a world of seamless mobility and better data-driven decisions
    June 5, 2017
    Denver’s pioneering Go Denver mobility-as-a-service app has attracted 7,000 users in a matter of months. Geoff Hadwick heard how at ITS International’s recent conference. If Mobility-as-a-Service (MaaS) is ever going to work, it needs to have “one universal platform everywhere” according to Sean Mackin, former manager of parking and mobility services at the Denver transportation and mobility department and now Colorado branch manager for ABM Parking & Transportation. Speaking at the recent MaaS Market confe
  • Real time active traffic management improves travel times
    July 17, 2012
    Traffic management centres (TMC) have traditionally served to provide surveillance and responses to traffic incidents and recurring and non-recurring changes in road networks. Typically, a TMC collected field data from the roadway and transit infrastructure and provided the integration necessary for operators to see what was happening and then coordinate a response. Standard operating procedures (SOPs) guided operators on how to respond to a given situation. It eventually became impractical for TMC operat