without requiring user authentication. An unauthorized user could
exploit this interface to manipulate robot control functions, including
initiating or halting runners, assigning jobs, clearing stations, and
deploying storage totes.
Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
Brightpick AI has not responded to requests to work with CISA to mitigate these vulnerabilities. Users of the affected products are encouraged to contact Brightpick AI https://brightpick.ai/contact-us/ for additional information.
Tue, 18 Nov 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sat, 15 Nov 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Brightpick Ai
Brightpick Ai internal Logic Control |
|
| Vendors & Products |
Brightpick Ai
Brightpick Ai internal Logic Control |
Fri, 14 Nov 2025 23:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Brightpick Internal Logic Control web interface is accessible without requiring user authentication. An unauthorized user could exploit this interface to manipulate robot control functions, including initiating or halting runners, assigning jobs, clearing stations, and deploying storage totes. | |
| Title | Brightpick Mission Control / Internal Logic Control Missing Authentication for Critical Function | |
| Weaknesses | CWE-306 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-11-17T16:51:31.868Z
Reserved: 2025-10-29T17:40:55.207Z
Link: CVE-2025-64307
Updated: 2025-11-17T16:51:27.964Z
Status : Awaiting Analysis
Published: 2025-11-15T00:15:47.700
Modified: 2025-11-18T14:06:55.963
Link: CVE-2025-64307
No data.
OpenCVE Enrichment
Updated: 2025-11-15T22:07:39Z