Weekly threat roundup: Zyxel, Samsung Galaxy, Windows 10
Pulling together the most dangerous and pressing flaws that businesses need to patch


Patch management is far easier said than done, and security teams may often be forced into prioritising fixes for several business-critical systems, all released at once. It’s become typical, for example, to expect dozens of patches to be released on Microsoft’s Patch Tuesday, with other vendors also routinely getting in on the act.
Below, IT Pro has collated the most pressing disclosures from the last seven days, including details such as a summary of the exploit mechanism, and whether the vulnerability is being exploited in the wild. This is in order to give teams a sense of which bugs and flaws might pose the most dangerous immediate security risks.
Admin-level backdoor in Zyxel’s VPNs
Zyxel customers are being urged to upgrade the firmware of their virtual private network (VPN), firewall, and access point controller products due to a serious hardcoded credential vulnerability.
Assigned CVE-2020-29583, the now-patched vulnerability essentially served as a backdoor account using a username and password that were both visible in plain text within Zyxel system binaries that run firmware version 4.60 Patch0. This ‘zyfwp’ account was included to deliver automatic firmware updates, although an individual could exploit the embedded flaw to gain root access to the Zyxel device, according to researchers with Eye Control.
The flaw affected dozens of individual products, with businesses using the company’s VPNs, firewalls, and access point controllers being urged to install version 4.60 Patch1 as soon as possible.
Samsung Galaxy fingerprint glitches return
The latest Samsung Galaxy Note 20 series was embedded with a fingerprint scanning flaw that mirrored the alarming 'fake fingerprint' vulnerability in Samsung Galaxy S10 and Note 10 devices.
A firmware update released this month patched a number of vulnerabilities, including SVE-2020-19216, branded ‘false recognition of fingerprint scanner’. According to the description, the flaw centred on odd behaviour centred on the smartphone’s screen protector resulting in a high false recognition rate.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
There’s nothing in the patch notes that suggest the flaw led to a higher ‘false acceptance rate’, which was the problem plaguing the previous generation of Samsung Galaxy devices. These problems were so severe that major banks, such as Nationwide and Natwest, withdrew biometric support for their apps on affected devices until the issues were resolved.
Windows 10 escalation of privilege flaw
On Christmas Eve, Google’s Project Zero security team published the details around a severe elevation of privilege flaw in Windows 10 that has been exploited in the wild.
The privilege of escalation vulnerability was first disclosed to Microsoft on 24 September, although it was eventually disclosed publicly after the 90-day window elapsed, even though a patch had yet to be released.
The flaw involves the ‘splwow64’ process and can be exploited if an attacker sends a local procedure call (LCP) message from another low-intensity malicious process. This would allow them to write arbitrary values to an arbitrary address in splwow64’s memory space.
The researcher behind the disclosure, Maddie Stone, said the original issue, assigned CVE-2020-0986, wasn’t properly fixed when Microsoft first attempted to patch it in June 2020, and that attackers only needed to make a few tweaks to continue to exploit the flaw, now identified as CVE-2020-17008. It’s expected that a patch will be available in the next patch Tuesday round of fixes.
TCP/IP flaws expose IoT and OT systems
Dozens of vulnerabilities are embedded in millions of internet of things (IoT) and operation technology (OT) systems, according to a report published in December by Forescout Research Labs.
The findings identified 33 flaws in four TCP/IP stacks, dubbed AMNESIA:33, leaving products belonging to more than 150 vendors compromised. Analysis has found the TCP/IP stacks are vulnerable across the board, with many of these flaws arising from bad software development practices. Feature-rich protocols, such as DNS, are also particularly affected.
Despite its claims that millions of devices are affected, the researchers added that it’s difficult to determine which devices are affected because of the complexity of IoT and OT supply chains.
However, some mitigating actions can be taken, such as disabling or blocking IPv6 traffic when it’s not needed since a handful of the flaws relate to IPv6 components. Devices should also be configured to rely on internal DNS servers as much as possible. Businesses should, finally, monitor network traffic for malformed packets.

Keumars Afifi-Sabet is a writer and editor that specialises in public sector, cyber security, and cloud computing. He first joined ITPro as a staff writer in April 2018 and eventually became its Features Editor. Although a regular contributor to other tech sites in the past, these days you will find Keumars on LiveScience, where he runs its Technology section.
-
Global cybersecurity spending is set to rise 12% in 2025 – here are the industries ramping up investment
News Global cybersecurity spending is expected to surge this year, fueled by escalating state-sponsored threats and the rise of generative AI, according to new analysis from IDC.
By Ross Kelly Published
-
Google Cloud is leaning on all its strengths to support enterprise AI
Analysis Google Cloud made a big statement at its annual conference last week, staking its claim as the go-to provider for enterprise AI adoption.
By Rory Bathgate Published
-
Hackers are targeting Ivanti VPN users again – here’s what you need to know
News Ivanti has re-patched a security flaw in its Connect Secure VPN appliances that's been exploited by a China-linked espionage group since at least the middle of March.
By Emma Woollacott Published
-
Broadcom issues urgent alert over three VMware zero-days
News The firm says it has information to suggest all three are being exploited in the wild
By Solomon Klappholz Published
-
Nakivo backup flaw still present on some systems months after firms’ ‘silent patch’, researchers claim
News Over 200 vulnerable Nakivo backup instances have been identified months after the firm silently patched a security flaw.
By Solomon Klappholz Published
-
Everything you need to know about the Microsoft Power Pages vulnerability
News A severe Microsoft Power Pages vulnerability has been fixed after cyber criminals were found to have been exploiting unpatched systems in the wild.
By Solomon Klappholz Published
-
Vulnerability management complexity is leaving enterprises at serious risk
News Fragmented data and siloed processes mean remediation is taking too long
By Emma Woollacott Published
-
A critical Ivanti flaw is being exploited in the wild – here’s what you need to know
News Cyber criminals are actively exploiting a critical RCE flaw affecting Ivanti Connect Secure appliances
By Solomon Klappholz Published
-
Researchers claim an AMD security flaw could let hackers access encrypted data
News Using only a $10 test rig, researchers were able to pull off the badRAM attack
By Solomon Klappholz Published
-
A journey to cyber resilience
whitepaper DORA: Ushering in a new era of cyber security
By ITPro Published