Currently, this project is in active development. Security updates will be provided for the latest version.
| Version | Supported |
|---|---|
| 0.4.x | ✅ |
| 0.3.x | |
| <0.3 | ❌ |
Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
- VISCA-over-IP uses UDP (port 52381) - no encryption by default
- NDI uses mDNS (port 5353) for discovery
- All network communication should be on trusted networks
- Config stored locally at
%LOCALAPPDATA%\VideoCue\config.json - Contains camera IP addresses and presets
- No passwords or credentials stored
- Keep dependencies updated:
pip install --upgrade -r requirements.txt - Monitor security advisories for PyQt6, pygame, numpy
- Downloaded from https://ndi.tv/tools/
- Verify download source before installation
- Keep NDI Runtime updated for security patches
- Firewall: Configure firewall rules for NDI and VISCA ports
- Network Isolation: Use on trusted/isolated networks for production
- Updates: Keep Python and all dependencies updated
- Access Control: Protect camera web interfaces with strong passwords
- Physical Security: PTZ cameras can be physically controlled - secure installations
- No built-in authentication for camera control
- VISCA protocol is unencrypted UDP
- Relies on network security (VLANs, firewalls)
For production deployments, consider:
- Network segmentation
- VPN for remote access
- Camera firmware updates
- Monitoring for unauthorized access