Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home News

Train Brakes Hackable via Radio

July 18, 2025
Reading Time: 3 mins read
in News
Train Brakes Hackable via Radio

The cybersecurity landscape for critical infrastructure is constantly evolving, and a recent disclosure by the US Cybersecurity and Infrastructure Security Agency (CISA) has brought a long-standing vulnerability in train control systems to the forefront. This vulnerability, identified as CVE-2025-1727, affects the remote linking protocol used by End-of-Train (EoT) and Head-of-Train (HoT) devices, critical components that enable communication and control over a train’s brakes. The core of the problem lies in the unsecure nature of this protocol, which lacks both authentication and encryption, making it susceptible to malicious exploitation.

EoT devices, also known as Flashing Rear End Devices (FREDs), are positioned at the rear of a train and transmit data to the HoT device in the locomotive. While primarily used to provide status data for long freight trains, these systems also possess the crucial capability to receive commands that apply the brakes at the rear of the train. CISA’s advisory highlights that an attacker could leverage readily available software-defined radio hardware and specially crafted packets to send their own brake control commands to the EoT device. The potential consequences are severe, ranging from sudden train stoppages that disrupt operations to inducing complete brake failure, which could lead to catastrophic derailments.

The discovery of this vulnerability is not new; it has a history stretching back over a decade. Researcher Neil Smith, credited by CISA, first identified this issue in 2012 while conducting industrial control system (ICS) security research. Smith, along with ICS-CERT (a predecessor to CISA), attempted to collaborate with the Association of American Railroads (AAR) for several years to address the vulnerability, but a consensus on remediation could not be reached. The AAR reportedly sought real-world proof of impact, which was difficult to provide given the immense safety risks involved. This disagreement culminated in public accusations in 2016 and further disclosures by another researcher, Eric Reuter, in 2018, yet no significant action was taken by the AAR. Alarmingly, Smith recently learned that the same weakness was initially reported to the AAR as far back as 2005, underscoring the long-standing nature of this unaddressed threat.

The recent CISA advisory is the result of Smith resubmitting his findings in 2024.

While the issue was initially downplayed by impacted vendors and the AAR, the AAR has now announced that it will be taking action. CISA’s advisory notes that there is currently no evidence of exploitation in the wild, providing a small window of opportunity for mitigation. The standards committee overseeing the protocol is actively seeking solutions, and the AAR is pursuing the development of new equipment and protocols to replace the vulnerable traditional EoT and HoT devices. This extensive undertaking will require upgrading approximately 25,000 HoT and 45,000 EoT devices, with the replacement process expected to commence in 2026.

This disclosure serves as a critical reminder of the ongoing cyber threats to railway systems, which have long been a concern within the cybersecurity industry. The threat is far from theoretical, as evidenced by recent incidents of both direct and indirect cyberattacks causing disruptions to railway operations globally. Notably, a 2023 incident in Poland saw 20 trains disrupted due to a hack that exploited a known, unencrypted radio frequency to broadcast stop commands to trains. The vulnerability in EoT/HoT systems presents a similar, if not more severe, risk, emphasizing the urgent need for comprehensive cybersecurity measures and proactive mitigation strategies within the rail industry to safeguard critical transportation infrastructure.

Reference:

  • Train Brakes Can Be Remotely Hacked via Radio And Industry Was Aware of Flaw for Over Two Decades
Tags: Cyber NewsCyber News 2025Cyber threatsJuly 2025
ADVERTISEMENT

Related Posts

CISA Releases Thorium for Malware Analysis

CISA Releases Thorium for Malware Analysis

August 1, 2025
CISA Releases Thorium for Malware Analysis

Canadian Criminal Sentenced for NFT Theft

August 1, 2025
CISA Releases Thorium for Malware Analysis

Russia Blocks US‑Made Speedtest Over Security

August 1, 2025
UNC2891 Hackers Breach ATMs

Chinese Firms Tied to Silk Typhoon Patents

July 31, 2025
UNC2891 Hackers Breach ATMs

FunkSec Ransomware Decryptor Released

July 31, 2025
UNC2891 Hackers Breach ATMs

UNC2891 Hackers Breach ATMs

July 31, 2025

Latest Alerts

Dahua Camera Flaws Enable Remote Hacking

NOVABLIGHT Steals Logins and Crypto

PyPI Warns of Email Phishing Attack

Choicejacking Attack Steals Phone Data

Hackers Exploit WordPress Theme Flaw

Hackers Spread JSCEAL via Fake Crypto Apps

Subscribe to our newsletter

    Latest Incidents

    Everest Ransomware Hits Mailchimp

    Cyberattack Hits French Natural History Museum

    Russia Faces Second Major Cyberattack

    SafePay Ransomware Threatens Ingram Micro

    Minnesota State Capital Under Cyberattack

    GLOBAL GROUP Ransomware Hits Albavisión

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial