The vulnerability, dubbed the “Tiny UDP Cannon,” allows any regular Android app with basic permissions to leak network traffic outside the VPN tunnel.
This bypass works even when users enable “Always-On VPN” and “Block connections without VPN,” two features designed to enforce complete traffic protection.
At the core of the issue is a design flaw in Android’s ConnectivityManager service.
Instead of sending network traffic directly, a malicious app can register a payload with the system process (system_server), which operates with elevated privileges and is not bound by VPN routing rules.
Once the app exits or its socket is destroyed, system_server sends the attacker-controlled data over the device’s physical network interface, such as Wi-Fi, completely bypassing the VPN.
This behavior stems from the method:
The method lacks:
As a result, even apps with only auto-granted permissions, such as INTERNET and ACCESS_NETWORK_STATE, can exploit this mechanism.
The vulnerability effectively breaks Android’s VPN trust model. Attackers can:
The issue was successfully tested on a Pixel 8 running Android 16 with Proton VPN enabled and lockdown mode active.
Below are key indicators associated with exploitation:
The issue was reported to Google’s Android Vulnerability Reward Program (VRP) in April 2026.
However, the Android Security Team classified it as “Won’t Fix (Infeasible)”. It stated that it does not meet the criteria for inclusion in a security bulletin.
Despite this, researchers argue that the flaw poses significant privacy risks, especially for users who rely on VPNs for anonymity.
A temporary mitigation exists via an ADB command that turns off the vulnerable QUIC feature:
After rebooting, the system stops sending the registered payloads, effectively blocking the leak.
However, this is not a permanent fix and may be removed in future updates.
Researchers at lowlevel.fun warned that system-level exemptions can unintentionally bypass key mobile security protections.
As VPN usage continues to grow, such bypasses could become a critical attack vector for surveillance and data leakage.
Users and security teams are advised to monitor unusual network activity and apply mitigations where possible until an official fix is introduced.
Follow us on Google News, LinkedIn, and X to Get More Instant Updates.
The post Android 16 VPN Bypass Lets Malicious Apps Reveal Users Real IP Address appeared first on Cyber Security News.
A newly disclosed zero-click exploit chain targeting Google Pixel 10 devices has raised fresh concerns…
ANDERSON, Ind. (WOWO) — A woman and her boyfriend were found dead inside an apartment…
LAKE COUNTY, Ind. (WOWO) — Several kids were killed Friday morning in a crash on…
There's a new flagship TV that's giving all other premium TVs a run for their…
Lionsgate has tapped Sam Raimi to direct a remake of the 1978 puppet horror movie,…
This website uses cookies.