Highway dynamic message signs (DMS) from LED display and scoreboard systems manufacturer Daktronics are vulnerable to cyberattacks, the Department of Homeland Security’s ICS-CERT (Industrial Control System Cyber Emergency Response Team) has warned.
In an alert published on Thursday, ICS-CERT revealed that the Daktronics Vanguard DMS configuration software has a default password that can be used to remotely access highway signs. Initially, the Federal Highway Administration informed ICS-CERT of a hardcoded password, but Daktronics has clarified that it’s actually a default password that can be changed upon installation.
A proof-of-concept for such attacks is publicly available, which is why entities responsible for highway signs are advised to take measures. Daktronics and the Federal Highway Administration recommend changing the default password to a strong one, placing the displays on private networks, and disabling telnet, webpage, and web LCD interfaces if not needed.
Traffic signs, particularly ones used in construction areas, are often hacked to display amusing messages. The control boxes on these displays are in many cases left unprotected and since they’re on ground-level, it’s not difficult to hijack them.
Recently, highway sign hacking has become more common. At the end of May, someone hijacked several signs in North Carolina and made them display a message which read “Hack by Sun Hacker.”
A Twitter user with the online moniker “SUN HACKER” described the following method that can be used to hack road signs: “1 Change the lan of VPN to INTERNET protocol. 2- Scan all the range of the IP on port 23. 3- bruteforce the password. 4- add your message.”
Highway signs are not the only component of the US road transportation system vulnerable to cyberattacks. In April, Cesar Cerrudo, CTO of research firm IOActive, revealed that the traffic control systems used in the United States and various other countries around the world contain flaws that can be exploited by an attacker to cause traffic jams and other problems at intersections, freeways and highways.

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- ICS Cybersecurity Firm Opscura Launches With $9.4 Million in Series A Funding
- Patch Released for Actively Exploited GoAnywhere MFT Zero-Day
- VMware Says No Evidence of Zero-Day Exploitation in ESXiArgs Ransomware Attacks
- Critical Baicells Device Vulnerability Can Expose Telecoms Networks to Snooping
- SecurityWeek Analysis: Over 450 Cybersecurity M&A Deals Announced in 2022
- VMware ESXi Servers Targeted in Ransomware Attack via Old Vulnerability
- High-Severity Privilege Escalation Vulnerability Patched in VMware Workstation
- GoAnywhere MFT Users Warned of Zero-Day Exploit
Latest News
- Germany Appoints Central Bank IT Chief to Head Cybersecurity
- OpenSSL Ships Patch for High-Severity Flaws
- Software Supply Chain Security Firm Lineaje Raises $7 Million
- ICS Cybersecurity Firm Opscura Launches With $9.4 Million in Series A Funding
- Vulnerability Provided Access to Toyota Supplier Management Network
- Patch Released for Actively Exploited GoAnywhere MFT Zero-Day
- Linux Variant of Cl0p Ransomware Emerges
- VMware Says No Evidence of Zero-Day Exploitation in ESXiArgs Ransomware Attacks
