Critical Security Flaw Allows Hackers to Remotely Trigger Train Brakes

Edward Zhou
Edward Zhou

CEO & Co-Founder

 
July 15, 2025 3 min read

Vulnerability in U.S. Train Systems

Many trains in the U.S. are vulnerable to a hack that can remotely lock a train’s brakes, as reported by the U.S. Cybersecurity and Infrastructure Security Agency (CISA). This vulnerability has been known for over a decade. Independent researcher Neil Smith first identified the issue back in 2012, which can be exploited over radio frequencies.

“All of the knowledge to generate the exploit already exists on the internet. AI could even build it for you,” Smith stated in an interview with 404 Media. The physical aspect of the hack means that exploitation cannot occur from another country; the attacker needs to be within a certain distance to successfully communicate with the train.

Hackers Can Remotely Trigger the Brakes on American Trains and the Problem Has Been Ignored for Years

Image courtesy of Cody Otto on Unsplash.

Exploitation Potential with Inexpensive Equipment

A critical flaw has been identified in the End-of-Train (EoT) and Head-of-Train (HoT) systems. This flaw allows an attacker using a $500 radio setup to potentially trigger emergency braking, which has finally gained proper attention. The vulnerability, tracked as CVE-2025-1727, involves a weak authentication process in the radio-based communication between EoT and HoT systems.

Image

An EoT device, also known as a Flashing Rear End Device (FRED), is a wireless system attached to the last car of a freight train. These systems, which lack encryption and proper authentication, could be exploited by attackers sending crafted radio packets via software-defined radios to issue unauthorized brake commands.

“Successful exploitation of this vulnerability could allow an attacker to send their own brake control commands to the end-of-train device, causing a sudden stoppage of the train which may lead to a disruption of operations, or induce brake failure,” according to the CISA advisory.

History of the Vulnerability

The vulnerability was first reported to the Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) in 2012. Smith explained that in the 1980s, the caboose was replaced by the EoT device, which wirelessly communicates telemetry and can receive brake commands. The protocol used is outdated and relies on a simple BCH checksum, with no real security measures in place.

"Turns out you can just hack any train in the USA and take control over the brakes. This is CVE-2025-1727 and it took me 12 years to get this published," Smith commented on X (formerly Twitter).

Hacking Train in USA

Image courtesy of Source Name.

Current Response and Future Actions

CISA has warned that successful exploitation could allow attackers to take control of train brakes, which raises significant safety concerns. The vulnerability affects major manufacturers, including Hitachi Rail STS USA, Wabtec, and Siemens. Although no active exploitation has been reported, the potential for catastrophic consequences remains.

The Association of American Railroads (AAR) has announced plans to replace the vulnerable protocol with IEEE 802.16t by 2027. However, the slow pace of action and the estimated cost of $7-10 billion to remediate the issue raises questions about industry accountability.

CISA’s advisory emphasizes that affected systems should be isolated from internet access and secured behind firewalls. The urgency for remedial action is clear, given that an attacker could cause significant disruptions with relatively inexpensive technology.

Recommendations for Mitigation

Experts suggest that while the AAR aims to replace the old protocols, the process will be lengthy. The lack of immediate mitigations poses a risk to both freight and passenger rail services across the U.S.

Rail operators must prioritize addressing this vulnerability to protect public safety. As the industry works towards implementing new systems, ongoing monitoring and proactive cybersecurity measures are essential.

Freight Train

Image courtesy of Source Name.

Explore our services or contact us at Gopher Security for more information on securing your systems against vulnerabilities like these.

Edward Zhou
Edward Zhou

CEO & Co-Founder

 

CEO & Co-Founder of Gopher Security, leading the development of Post-Quantum cybersecurity technologies and solutions.

Related News

SolarWinds Patches Critical Web Help Desk RCE Vulnerabilities Now
SolarWinds Web Help Desk

SolarWinds Patches Critical Web Help Desk RCE Vulnerabilities Now

Critical RCE & Auth Bypass flaws in SolarWinds Web Help Desk are fixed! Don't risk it. Update to v2026.1 now to protect your systems. Learn more.

By Edward Zhou March 9, 2026 4 min read
common.read_full_article
AI vs Human Hackers: Who Prevails in 2026 Pen Testing?
AI hacking

AI vs Human Hackers: Who Prevails in 2026 Pen Testing?

Discover the results of a groundbreaking study comparing AI agents and human hackers in web vulnerability exploitation. See who prevails and what it means for your security. Read now!

By Jim Gagnard March 6, 2026 6 min read
common.read_full_article
Vulnerability Exploits Lead Cyber Intrusions in 2026 Trends
vulnerability exploits

Vulnerability Exploits Lead Cyber Intrusions in 2026 Trends

Exploits are now the top intrusion method, outpacing phishing. Discover why rapid vulnerability patching is critical and how to bolster your defenses. Read more!

By Edward Zhou March 4, 2026 4 min read
common.read_full_article
Google Dismantles IPIDEA, Major Proxy Network for 550+ Threats
Ipidea proxy network

Google Dismantles IPIDEA, Major Proxy Network for 550+ Threats

Google has disrupted Ipidea, a massive residential proxy network used by cybercriminals. Learn how this action impacts online security and what it means for threat actors. Read now!

By Brandon Woo February 27, 2026 4 min read
common.read_full_article