WeSearch

Android VPN IP Leak Even If Always-On VPN Enabled

·9 min read · 0 reactions · 0 comments · 1 view
#android#vpn#security#ip leak#quic#Android 16#Pixel 8#Proton VPN#system_server#ConnectivityManager
Android VPN IP Leak Even If Always-On VPN Enabled
⚡ TL;DR · AI summary

A vulnerability in Android 16 allows apps to leak a user's real IP address even when Always-On VPN and 'Block connections without VPN' are enabled. The issue stems from a QUIC-related feature that lets system_server send UDP packets on behalf of apps, bypassing VPN routing rules. This behavior is not considered part of Android's current threat model, leaving users potentially exposed despite relying on VPN protections.

Key facts
Original article
Lowlevel
Read full at Lowlevel →
Opening excerpt (first ~120 words) tap to expand

The Tiny UDP Cannon: An Android VPN BypassPosted on Apr 30, 2026On Android 16, a regular app with no special permissions can leak the user’s real IP, even with “Always-On VPN” + “Block connections without VPN” turned on. Those two settings are supposed to be the hard guarantee that nothing leaves the device outside the tunnel. They don’t hold here.The trick is that the app doesn’t send the packet itself. It hands the bytes and a destination to system_server (UID 1000, exempt from VPN routing), then exits. A moment later system_server opens a UDP socket on the physical Wi-Fi interface and fires those bytes at the destination. The VPN never sees them. The destination sees your real public IP.

Excerpt limited to ~120 words for fair-use compliance. The full article is at Lowlevel.

Anonymous · no account needed
Share 𝕏 Facebook Reddit LinkedIn Threads WhatsApp Bluesky Mastodon Email

Discussion

0 comments

More from Lowlevel