Skip to main content

Traffic control systems ‘vulnerable to hacking’

Devices used by traffic control systems are vulnerable to being hacked, according to computer security specialist IOActive. Hackers could gain complete control of these devices and cause traffic issues for the cities in the US, UK, France, Australia, China and beyond.
May 1, 2014 Read time: 2 mins
Devices used by traffic control systems are vulnerable to being hacked, according to computer security specialist IOActive. Hackers could gain complete control of these devices and cause traffic issues for the cities in the US, UK, France, Australia, China and beyond.

IOActive researcher CESAR Cerrudo, who examined the systems, said the hackers would not target the traffic lights directly but rather magnetic sensors embedded in streets that feed data to traffic control systems.

Cerrudo found that the systems lack basic security protections, such as data encryption and authentication, allowing the data to be monitored, or, theoretically, replaced with false information. So, although an attacker can’t control traffic signals directly through the sensors, he might be able to fool the control systems into reading congested roadways as clear or free-running roadways as congested, causing traffic signals to respond accordingly.

By exploiting the vulnerabilities he found, Cerrudo feels an attacker could cause traffic jams and problems at intersections, on freeways, highways and other areas.

Depending on the configuration it is possible to make traffic lights stay green for more or less time, stay red and not change to green or flash. Electronic signs could display incorrect speed limits and instructions, while ramp meters could allow cars on the freeway faster or slower than needed.  

Although manual overrides and secondary controls can be used if anomalies are detected, Cerrudo said the possibility of a real attack shouldn’t be disregarded as launching an attack is simple. Making an attack have a bigger impact would be more complex but not impossible.

Cerrudo said the vendor had been contacted in September 2013 through the 1742 Department of Homeland Security’s ICS-CERT. “I was told by ICS-CERT that the vendor said they didn't think the issues were either critical or even important.”

Regarding one of the vulnerabilities, the unnamed vendor is reported to have said the devices were designed that way as customers (state/city governments) wanted them to work that way and they were working as designed, so there wasn't a security issue.
“Yes that was the answer, I couldn't believe it,” he said.

His findings will be presented to the forthcoming Infiltrate conference in Florida.

For more information on companies in this article

Related Content

  • Want intelligent transit? Then share data
    March 2, 2022
    How will the US deploy intelligent transit networks that enable connected vehicles? Data sharing is crucial if urban mobility users are to benefit, explains Timothy Menard of Lyt
  • New system expedites border crossings
    October 28, 2016
    Enforcing border controls can create long queues for travellers, David Crawford looks at potential solutions. Long delays at border crossings in both North America and Europe have sparked the development of new queue visualisation and management technologies that are cutting hours, even days, off international passenger and freight journeys. At the westernmost end of the 2,019km (1,250 mile) Mexico–US frontier, two parallel crossings between Tijuana, in the former country, and the border city of San Diego,
  • Missouri’s smart solution for rural road monitoring
    July 7, 2017
    David Crawford sees how Missouri is using commercially available information to rapidly improve monitoring and driver information on rural highways. Missouri is a predominantly rural state with the second largest number of farms in the country and agriculture the main occupation in 97 of its 114 counties. US statistics starkly reveal how road accidents in rural areas tend to be more serious than in urban regions and of the 32,000 US motorists killed each year, 54% die on roads in rural areas even though onl
  • AVs and bombs: a sinister possibility
    November 6, 2019
    Vehicle-ramming attacks by terrorists on pedestrians – often involving multiple fatalities - are sobering reminders of how cars and vans can be used for ill. But a recent court case in the UK highlights a sinister use of newer technology