Vulnerability could allow an attacker to list and view active meetings that are not protected. Attack takes advantage of web conferencing application program interfaces (APIs) by the use of a bot which cycles through (enumerates) and discovers valid numeric meeting IDs. Attack has been given the “cute” name of “Prying-Eye vulnerability” by Cequence Security’s CQ Research Team. All users should adopt “best practice” of using vendor-supplied security functionality to protect their meetings.”]

