Categories: Cyber Security News

Android 16 VPN Bypass Lets Malicious Apps Reveal Users Real IP Address

A newly disclosed flaw in Android 16 is raising serious privacy concerns after researchers revealed that malicious apps can bypass VPN protections and expose a user’s real IP address even when strict security settings are enabled.

The vulnerability, dubbed the “Tiny UDP Cannon,” allows any regular Android app with basic permissions to leak network traffic outside the VPN tunnel.

This bypass works even when users enable “Always-On VPN” and “Block connections without VPN,” two features designed to enforce complete traffic protection.

Android 16 VPN Bypass

At the core of the issue is a design flaw in Android’s ConnectivityManager service.

Instead of sending network traffic directly, a malicious app can register a payload with the system process (system_server), which operates with elevated privileges and is not bound by VPN routing rules.

Once the app exits or its socket is destroyed, system_server sends the attacker-controlled data over the device’s physical network interface, such as Wi-Fi, completely bypassing the VPN.

This behavior stems from the method:

  • registerQuicConnectionClosePayload

The method lacks:

  • Permission checks.
  • Payload validation.
  • Awareness of VPN lockdown policies.

As a result, even apps with only auto-granted permissions, such as INTERNET and ACCESS_NETWORK_STATE, can exploit this mechanism.

The vulnerability effectively breaks Android’s VPN trust model. Attackers can:

  • Reveal a user’s real public IP address.
  • Exfiltrate data outside encrypted VPN tunnels.
  • Track users despite privacy protections.

The issue was successfully tested on a Pixel 8 running Android 16 with Proton VPN enabled and lockdown mode active.

Indicators of Compromise (IOCs)

Below are key indicators associated with exploitation:

  • Network Activity: Unauthorized UDP packets sent outside the VPN tunnel.
  • Source IP: Device’s real Wi-Fi IP (e.g., 192.168.x.x).
  • Destination: Attacker-controlled server and port (e.g., port 3131).
  • Payload Pattern: Arbitrary or tagged data such as EXFIL{src=IP}.
  • Permissions Used: INTERNET, ACCESS_NETWORK_STATE.
  • System Component: system_server (UID 1000) initiating traffic.

The issue was reported to Google’s Android Vulnerability Reward Program (VRP) in April 2026.

However, the Android Security Team classified it as “Won’t Fix (Infeasible)”. It stated that it does not meet the criteria for inclusion in a security bulletin.

Despite this, researchers argue that the flaw poses significant privacy risks, especially for users who rely on VPNs for anonymity.

A temporary mitigation exists via an ADB command that turns off the vulnerable QUIC feature:

  • adb shell device_config put tethering close_quic_connection -1

After rebooting, the system stops sending the registered payloads, effectively blocking the leak.

However, this is not a permanent fix and may be removed in future updates.

Researchers at lowlevel.fun warned that system-level exemptions can unintentionally bypass key mobile security protections.

As VPN usage continues to grow, such bypasses could become a critical attack vector for surveillance and data leakage.

Users and security teams are advised to monitor unusual network activity and apply mitigations where possible until an official fix is introduced.

Follow us on Google NewsLinkedIn, and X to Get More Instant Updates.

The post Android 16 VPN Bypass Lets Malicious Apps Reveal Users Real IP Address appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

Google Project Zero Discloses Zero-Click Exploit Chain for Pixel 10 Devices

A newly disclosed zero-click exploit chain targeting Google Pixel 10 devices has raised fresh concerns…

45 minutes ago

Two People Found Dead In Anderson

ANDERSON, Ind. (WOWO) — A woman and her boyfriend were found dead inside an apartment…

1 hour ago

Three Killed In Lake County Crash

LAKE COUNTY, Ind. (WOWO) — Several kids were killed Friday morning in a crash on…

7 hours ago

The Just-Released Hisense UR9 RGB Mini-LED TV Might Just Give OLED a Run for Its Money

There's a new flagship TV that's giving all other premium TVs a run for their…

7 hours ago

Sam Raimi Set to Direct Magic Remake With Script from Send Help Writers

Lionsgate has tapped Sam Raimi to direct a remake of the 1978 puppet horror movie,…

7 hours ago

This website uses cookies.