
Android 16 Bug Exposes Users' IP Addresses by Bypassing VPNs
A critical bug in Android 16 bypasses VPNs, jeopardizing user privacy and leaking IP addresses, despite existing safeguards.
A Vulnerability in Android 16
Recent reports have unveiled a significant vulnerability in Android 16 that enables applications to circumvent Virtual Private Network (VPN) protections, potentially leaking users' IP addresses. This issue was brought to light by a Zurich-based security engineer, who noted that the flaw has troubling implications for privacy and security.
Details of the Vulnerability
The security engineer, who shared insights on lowlevel.fun, reported the bug through Google's Vulnerability Reward Program, which incentivizes the identification of security flaws. However, Google's security team assessed the situation, stating the issue was "infeasible" to fix and not prioritized for immediate attention. According to a representative for Google, the flaw only affects devices that have downloaded malicious applications and that Google Play Protect does for the most part shield users from known threats.
This vulnerability exploits a weakness in the ConnectivityManager system service in Android, which is responsible for sending messages to web servers when an online connection has ended. Alertingly, this system bypasses the VPN tunnel, resulting in unencrypted traffic and exposing sensitive information including the device's real IP address, irrespective of the chosen server location.
Implications for Users
Even with VPN features like "Always-on VPN" or "Block connections without VPN" activated, this bug allows apps to operate outside these safety nets, leaving users vulnerable and potentially resulting in a false sense of security. While there is currently no evidence indicating that the vulnerability has been exploited for data collection, the unresolved nature of the bug poses ongoing risks for Android 16 users.
Alternative Solutions
In response to the growing concern, alternative operating systems like GrapheneOS have addressed and patched this vulnerability, affirming that it is indeed fixable. Security experts suggest users concerned about their privacy transition to platforms like GrapheneOS, which provide enhanced security features.
Moreover, the engineer who discovered the flaw has shared a temporary workaround involving a debug command effective when USB debugging is enabled. However, users are advised to proceed with caution, as using the workaround without understanding the implications of USB debugging can bring about additional risks. Given that future Android updates may potentially disable this fix, it should not be assumed as a permanent solution.
In light of the seriousness of this disclosure, it is essential for Android 16 users to remain vigilant about their app installations and the permissions they grant, as well as to explore alternative platforms or security measures to protect their online privacy effectively.
Popular news
The US prepares for a long fight against China's grip on rare earth resources, as experts predict it may take another decade to break free.
Subscribe to
our news
Get the most important updates and top stories in your inbox.





