Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-60892: n/a

0
Unknown
VulnerabilityCVE-2025-60892cvecve-2025-60892
Published: Mon Nov 03 2025 (11/03/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue in Raspberry Pi Imager version 1.9.6 for Windows, affecting its OS customization feature. The imager's 'public-key authentication' setting unintentionally re-adds a user's id_rsa.pub key from their local Windows machine to the authorized_keys file on the Raspberry Pi, even after the user explicitly deletes the key from the user interface. This creates an unintended attack surface, as it could allow an attacker to use a different key than the intended one to login to the device.

AI-Powered Analysis

AILast updated: 11/03/2025, 15:18:45 UTC

Technical Analysis

CVE-2025-60892 identifies a security vulnerability in Raspberry Pi Imager version 1.9.6 for Windows, specifically within its OS customization feature that manages SSH public key authentication. The imager is designed to allow users to customize Raspberry Pi OS images, including adding SSH public keys to the authorized_keys file to enable secure remote login. However, this vulnerability causes the imager to re-add the user's id_rsa.pub key from their local Windows machine to the authorized_keys file on the Raspberry Pi even after the user explicitly deletes the key through the user interface. This unintended behavior creates an attack surface by allowing SSH access with a key that the user intended to remove, potentially enabling unauthorized access if an attacker gains control or access to the local Windows environment or the imager process. The vulnerability does not currently have a CVSS score and no known exploits have been reported in the wild. Exploitation requires the attacker to have access to the Windows machine running the imager and to use the OS customization feature to prepare the Raspberry Pi image. The flaw affects the confidentiality and integrity of the Raspberry Pi device by potentially allowing unauthorized SSH logins, which could lead to further compromise of the device and connected networks. The issue is specific to the Windows version of the imager and version 1.9.6, with no information about other versions being affected. No patches or updates have been linked yet, indicating users should exercise caution and monitor for updates. The vulnerability is particularly relevant for environments where Raspberry Pi devices are deployed with customized OS images, such as educational institutions, industrial IoT setups, and development environments.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to the confidentiality and integrity of Raspberry Pi devices configured using the affected imager version. Unauthorized SSH access could allow attackers to execute arbitrary commands, install malware, or pivot to other network resources, potentially compromising sensitive data and operational technology. Organizations using Raspberry Pi devices in critical infrastructure, research, or industrial automation may face operational disruptions or data breaches. The risk is heightened in environments where physical security is limited or where the Windows machines used for imaging are shared or less secure. While the vulnerability does not directly affect availability, unauthorized access could lead to device misconfiguration or denial of service through malicious actions. The lack of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits once the vulnerability becomes widely known. European organizations relying on Raspberry Pi for prototyping, IoT deployments, or educational purposes should assess their exposure and implement controls to prevent unauthorized access.

Mitigation Recommendations

1. Avoid using Raspberry Pi Imager version 1.9.6 on Windows for OS customization until a patch is released. 2. Manually verify and clean the authorized_keys file on Raspberry Pi devices after imaging to ensure only intended keys are present. 3. Use alternative imaging tools or methods that do not exhibit this behavior, such as imaging on Linux or macOS if feasible. 4. Restrict access to Windows machines used for imaging to trusted personnel and secure them with strong authentication and endpoint protection. 5. Monitor Raspberry Pi devices for unauthorized SSH logins and implement network segmentation to limit potential lateral movement. 6. Stay updated with Raspberry Pi Foundation announcements for patches or updated imager versions addressing this vulnerability. 7. Educate users about the risks of SSH key management and the importance of verifying authorized_keys content post-imaging. 8. Consider disabling SSH key authentication temporarily if practical and use alternative secure access methods until the issue is resolved.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-09-26T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6908c45e69f0cf13c9156063

Added to database: 11/3/2025, 3:03:58 PM

Last enriched: 11/3/2025, 3:18:45 PM

Last updated: 11/3/2025, 7:06:39 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats