Executive Summary
In November 2025, vulnerabilities were discovered in Brightpick AI's Mission Control and Internal Logic Control, software used for warehouse automation globally. Security researcher Souvik Kandar disclosed that all product versions lacked authentication for critical functions and exposed sensitive credentials via unencrypted channels, including WebSocket traffic accessible without prior authentication. If exploited, attackers could manipulate robot controls or intercept sensitive information, posing operational and confidentiality risks to organizations in sectors such as manufacturing, healthcare, and logistics. Brightpick AI had not issued a response or patch at the time of the initial disclosure.
This incident stands out due to its impact on operational technology and industrial control systems, highlighting the widespread risk of exposed critical functions and hardcoded credentials in automation platforms. With growing connectivity in ICS environments, such vulnerabilities reflect an urgent need for organizations to bolster segmentation, credential management, and network security controls.
Why This Matters Now
The Brightpick incident underscores the persistent threat posed by inadequate authentication and exposed credentials in industrial automation. As operational technologies continue to integrate with IT networks, attacks that exploit such weaknesses can disrupt critical business functions and put sensitive data at risk — making proactive zero trust and east-west security segmentation urgently necessary.
Attack Path Analysis
The attacker remotely discovered the unauthenticated web interface and accessed critical functions of Brightpick Mission Control via exposed APIs. Using leaked or hardcoded credentials in unprotected transport, the attacker performed unauthorized actions, potentially escalating access. Lateral movement within the cloud or hybrid environment was possible by targeting additional systems exposed to the flat network. Command-and-control could be established over web or WebSocket channels to maintain access and issue further commands. Sensitive data, credentials, and telemetry were exfiltrated through unprotected network traffic. Finally, the attacker manipulated robot operations, altered workflows, or disrupted fulfillment processes, causing business impact.
Kill Chain Progression
Initial Compromise
Description
The attacker identified and directly accessed the Brightpick Mission Control web interface, which lacked authentication, enabling unauthorized entry.
Related CVEs
CVE-2025-64307
CVSS 6.5The Brightpick Internal Logic Control web interface is accessible without requiring user authentication, allowing unauthorized users to manipulate robot control functions.
Affected Products:
Brightpick AI Brightpick Mission Control / Internal Logic Control – All versions
Exploit Status:
no public exploitCVE-2025-64308
CVSS 7.5The Brightpick Mission Control web application exposes hardcoded credentials in its client-side JavaScript bundle.
Affected Products:
Brightpick AI Brightpick Mission Control – All versions
Exploit Status:
no public exploitCVE-2025-64309
CVSS 8.6Brightpick Mission Control discloses device telemetry, configuration, and credential information via WebSocket traffic to unauthenticated users when they connect to a specific URL.
Affected Products:
Brightpick AI Brightpick Mission Control – All versions
Exploit Status:
no public exploit
MITRE ATT&CK® Techniques
Exploit Public-Facing Application
Valid Accounts
Unsecured Credentials: Credentials in Files
Network Sniffing
Adversary-in-the-Middle: Web Session Cookie
Remote Services: Remote Desktop Protocol
Data Manipulation: Stored Data Manipulation
Account Access Removal
Potential Compliance Exposure
Mapping incident impact across multiple compliance frameworks.
PCI DSS 4.0 – User Identification and Authentication
Control ID: 8.2.1
PCI DSS 4.0 – Secure Authentication and Transmission
Control ID: 8.3.1
NYDFS 23 NYCRR 500 – Cybersecurity Policy
Control ID: 500.03
DORA (Regulation (EU) 2022/2554) – ICT Risk Management - Access Controls
Control ID: Art. 9(2)
CISA ZTMM 2.0 – Access Policies and Authentication Enforcement
Control ID: Identity Pillar: Policy Enforcement
NIS2 Directive (EU) 2022/2555 – Risk Analysis and Information System Security Policies
Control ID: Art. 21(2)(a)
Sector Implications
Industry-specific impact of the vulnerabilities, including operational, regulatory, and cloud security risks.
Critical Manufacturing
Warehouse automation systems face severe ICS vulnerabilities enabling unauthorized robot control manipulation, job assignment interference, and operational disruption without authentication requirements.
Health Care / Life Sciences
Medical supply chain automation vulnerabilities expose patient-critical inventory systems to unauthorized access, potentially disrupting medication distribution and medical device availability.
Logistics/Procurement
Brightpick automation platform weaknesses allow attackers to manipulate storage totes, halt runners, and access telemetry data, severely compromising supply chain operations.
Consumer Goods
Retail fulfillment automation systems vulnerable to credential exposure and unauthenticated control access, enabling inventory manipulation and distribution network compromise attacks.
Sources
- Brightpick Mission Control / Internal Logic Controlhttps://www.cisa.gov/news-events/ics-advisories/icsa-25-317-04Verified
- CVE-2025-64307 Detailhttps://nvd.nist.gov/vuln/detail/CVE-2025-64307Verified
- CVE-2025-64308 Detailhttps://nvd.nist.gov/vuln/detail/CVE-2025-64308Verified
- CVE-2025-64309 Detailhttps://nvd.nist.gov/vuln/detail/CVE-2025-64309Verified
Frequently Asked Questions
Cloud Native Security Fabric Mitigations and ControlsCNSF
Zero Trust segmentation, encrypted traffic controls, and egress policy enforcement would have limited unauthorized access, contained attacker movement, and prevented credential/data exposure within Brightpick's cloud-connected ICS environment. CNSF-aligned visibility and real-time enforcement mechanisms increase detection and response efficacy for such threats.
Control: Zero Trust Segmentation
Mitigation: Unauthorized access to critical interfaces blocked by identity-based policy.
Control: Threat Detection & Anomaly Response
Mitigation: Suspicious credential usage and privilege anomalies detected in real-time.
Control: East-West Traffic Security
Mitigation: Lateral movement prevented or detected on workload-to-workload connections.
Control: Inline IPS (Suricata)
Mitigation: Malicious command-and-control traffic identified and blocked inline.
Control: Egress Security & Policy Enforcement
Mitigation: Unapproved outbound data flows blocked and exfiltration attempts logged.
Real-time behavioral enforcement prevents unauthorized critical function manipulation.
Impact at a Glance
Affected Business Functions
- Warehouse Operations
- Inventory Management
- Order Fulfillment
Estimated downtime: 3 days
Estimated loss: $500,000
Potential exposure of sensitive operational data, including device telemetry, configuration settings, and credentials, which could be exploited to disrupt warehouse automation processes.
Recommended Actions
Key Takeaways & Next Steps
- • Segment ICS, application, and user networks with Zero Trust policies to restrict access to critical APIs.
- • Enforce encrypted traffic (MACsec, VPNs, etc.) for all data in transit, especially for credentials and telemetry streams.
- • Implement egress filtering and strict outbound policy enforcement to block unauthorized data exfiltration.
- • Deploy real-time threat and anomaly detection for credential harvesting and privilege abuse across all network layers.
- • Establish centralized visibility and continuous cloud-native monitoring to ensure security posture and compliance across hybrid cloud and on-prem environments.



