Skip to main content

Traffic control systems ‘vulnerable to hacking’

Devices used by traffic control systems are vulnerable to being hacked, according to computer security specialist IOActive. Hackers could gain complete control of these devices and cause traffic issues for the cities in the US, UK, France, Australia, China and beyond.
May 1, 2014 Read time: 2 mins
Devices used by traffic control systems are vulnerable to being hacked, according to computer security specialist IOActive. Hackers could gain complete control of these devices and cause traffic issues for the cities in the US, UK, France, Australia, China and beyond.

IOActive researcher CESAR Cerrudo, who examined the systems, said the hackers would not target the traffic lights directly but rather magnetic sensors embedded in streets that feed data to traffic control systems.

Cerrudo found that the systems lack basic security protections, such as data encryption and authentication, allowing the data to be monitored, or, theoretically, replaced with false information. So, although an attacker can’t control traffic signals directly through the sensors, he might be able to fool the control systems into reading congested roadways as clear or free-running roadways as congested, causing traffic signals to respond accordingly.

By exploiting the vulnerabilities he found, Cerrudo feels an attacker could cause traffic jams and problems at intersections, on freeways, highways and other areas.

Depending on the configuration it is possible to make traffic lights stay green for more or less time, stay red and not change to green or flash. Electronic signs could display incorrect speed limits and instructions, while ramp meters could allow cars on the freeway faster or slower than needed.  

Although manual overrides and secondary controls can be used if anomalies are detected, Cerrudo said the possibility of a real attack shouldn’t be disregarded as launching an attack is simple. Making an attack have a bigger impact would be more complex but not impossible.

Cerrudo said the vendor had been contacted in September 2013 through the 1742 Department of Homeland Security’s ICS-CERT. “I was told by ICS-CERT that the vendor said they didn't think the issues were either critical or even important.”

Regarding one of the vulnerabilities, the unnamed vendor is reported to have said the devices were designed that way as customers (state/city governments) wanted them to work that way and they were working as designed, so there wasn't a security issue.
“Yes that was the answer, I couldn't believe it,” he said.

His findings will be presented to the forthcoming Infiltrate conference in Florida.

For more information on companies in this article

Related Content

  • Michigan researchers show how easy it is to hack trucks
    August 5, 2016
    Cybersecurity researchers have already shown how easy it is to hack a Jeep Cherokee and take control of its brakes and steering, resulting in a recall for the vulnerability to be corrected. At the Usenix Workshop on Offensive Technologies conference next week, a group of University of Michigan researchers plan to demonstrate how trucks, which have also begun adding similar electronic control system, can be vulnerable to hacking. They plan to show how the openness of the SAE J1939 standard used across
  • Rio’s TMC rises to Olympic challenge
    October 27, 2016
    Timothy Compston lifts the lid on Rio de Janeiro’s preparations for keeping its transport systems moving during the Olympics – and the outcome. Hosting the Olympics poses major traffic management challenges for any city and Rio was no exception – especially as it is already one of the world’s most congested cities. Beyond its normal 6.5 million inhabitants wanting to carry on their daily lives, in August Rio was also home to 11,300 athletes from 206 countries. Athletes who, without fail, had to reach their
  • 'Phantom’ menace endangers AV passengers, says study 
    February 20, 2020
    Projecting a ‘phantom’ image on the road can cause a semi-autonomous vehicle to brake suddenly and endanger passengers, according to a new study. 
  • European tunnel safety steps up a gear
    September 19, 2017
    David Crawford reviews the latest safety systems installed in European tunnels. Blueprints for the safer road tunnels of the future are emerging fast as European operators invest in technologies to enhance travellers’ prospects of surviving an accident. Central to modern emergency planning is the principle that, following an incident, drivers should be enabled to rescue themselves and their passengers with the aid of prompt and correct identification and communication of the hazard. Roles for cooperativ