The Brightpick Internal Logic Control web interface is accessible
without requiring user authentication. An unauthorized user could
exploit this interface to manipulate robot control functions, including
initiating or halting runners, assigning jobs, clearing stations, and
deploying storage totes.
Metrics
Affected Vendors & Products
References
History
Sat, 15 Nov 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Brightpick Ai
Brightpick Ai internal Logic Control |
|
| Vendors & Products |
Brightpick Ai
Brightpick Ai internal Logic Control |
Fri, 14 Nov 2025 23:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Brightpick Internal Logic Control web interface is accessible without requiring user authentication. An unauthorized user could exploit this interface to manipulate robot control functions, including initiating or halting runners, assigning jobs, clearing stations, and deploying storage totes. | |
| Title | Brightpick Mission Control / Internal Logic Control Missing Authentication for Critical Function | |
| Weaknesses | CWE-306 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: icscert
Published: 2025-11-14T23:34:59.659Z
Updated: 2025-11-14T23:34:59.659Z
Reserved: 2025-10-29T17:40:55.207Z
Link: CVE-2025-64307
No data.
Status : Received
Published: 2025-11-15T00:15:47.700
Modified: 2025-11-15T00:15:47.700
Link: CVE-2025-64307
No data.
ReportizFlow