Jorge Sainz-RasoMartín Gutiérrez, SergioDíaz Orueta, GabrielPancorbo Castro, Manuel2024-10-112024-10-112019-11-01J. Sainz-Raso, S. Martin, G. Diaz and M. Castro, "Security Vulnerabilities in Raspberry Pi–Analysis of the System Weaknesses," in IEEE Consumer Electronics Magazine, vol. 8, no. 6, pp. 47-52, 1 Nov. 2019, doi: 10.1109/MCE.2019.2941347ISSN: 2162-2248, e- ISSN: 2162-2256https://doi.org/10.1109/MCE.2019.2941347https://hdl.handle.net/20.500.14468/24023This is the accepted manuscript of the article. The trademarked version was first published in IEEE Consumer Electronics Magazine, vol. 8, no. 6, pp. 47-52, 1 Nov. 2019, is available online on the publisher's website: https://doi.org/10.1109/MCE.2019.2941347 Este es el manuscrito aceptado del artículo. La versión registrada fue publicada por primera vez en IEEE Consumer Electronics Magazine, vol. 8, no. 6, pp. 47-52, 1 Nov. 2019, está disponible en línea en el sitio web del editor: https://doi.org/10.1109/MCE.2019.2941347The Internet of Things (IoT) is made up of many devices, platforms, and communication protocols. Among them, Raspberry Pi has arisen as one of the most popular equipment for hobby and education purposes because of its low cost, small size, flexibility, and potential. Nevertheless, Raspberry Pi needs an operating system to work, which exposes it to software vulnerabilities despite the many advantages it provides in comparison with nonoperating system devices. This device also has hardware limitations, which impact on its security. These limitations exist because some concessions had to be done during the design in order to decrease the cost of the device. This article analyzes different hardware and software vulnerabilities that can be found in a Raspberry Pi when using a default installation of different available operating systems. Finally, we propose a list of good practices to minimize the presented issues.eninfo:eu-repo/semantics/openAccess33 Ciencias TecnológicasSecurity vulnerabilities in Raspberry Pi. Analysis of hardware and software weaknessesartículocomputer securityinternet of thingsserverspassworduniversal serial bussoftware engineering