Android 16 VPN Bypass: GrapheneOS Patches Flaw Google Refused to Fix
For users who rely on Virtual Private Networks (VPNs) to secure their identity and data, the primary goal is simple: ensure no traffic leaves the device without encryption. However, a newly discovered vulnerability in Android 16, nicknamed the “Tiny UDP Cannon,” breaks this fundamental promise, potentially exposing a user’s real IP address to the open internet.
While Google’s Android Security Team has declined to patch the bug, GrapheneOS—a privacy-hardened version of Android—has already stepped in with a fix. This divergence in security philosophy highlights a growing tension between mainstream OS development and the requirements of high-security privacy environments.
Understanding the “Tiny UDP Cannon” Vulnerability
A VPN acts as a sealed tunnel for your data. To prevent accidental leaks, Android provides strict “lockdown” settings, specifically “Always-On VPN” and “Block connections without VPN.” When these are enabled, the operating system is supposed to kill any connection that attempts to bypass the encrypted tunnel.
The “Tiny UDP Cannon” bug undermines these protections. It allows a regular application to leak data outside the active VPN tunnel, meaning the device transmits information using its real IP address rather than the VPN’s masked address. This leak occurs even when the strictest privacy settings are active, rendering the “Block connections without VPN” feature unreliable.
The Threat Model: How the Leak Happens
this is not a “zero-click” exploit. For an attacker to take advantage of this flaw, a malicious app must already be installed on the target device. Once installed, the app can use this bypass to send packets outside the VPN, allowing third parties to track the user’s actual location and identity through their public IP address.

Google’s Response: “Won’t Fix”
The vulnerability was discovered and reported by Yusef, a Zurich-based security researcher known as @cybaqkebm, through the Android Vulnerability Reward Program. Despite the technical evidence provided in a detailed research paper, Google’s Android Security Team classified the issue as “Won’t Fix (Infeasible).”
Google’s decision stems from their specific “threat model.” Because the exploit requires a malicious app to be present on the device, Google believes the risk falls outside the scope of what necessitates a core OS patch. From their perspective, the prerequisite of having a malicious app installed is a sufficient barrier.
How GrapheneOS Solved the Problem
GrapheneOS, which prioritizes maximum privacy and security, disagreed with Google’s assessment. For users of privacy-focused distributions, the presence of a malicious app is a known risk that the OS should mitigate, not an excuse to leave a leak open.
To resolve the issue, GrapheneOS shipped an update that disables the underlying feature responsible for the leak. By removing the functionality that allows this specific type of UDP traffic to bypass the VPN, GrapheneOS has restored the integrity of the “Always-On” VPN promise for its users.
- The Flaw: Android 16 allows apps to leak data outside a VPN tunnel via the “Tiny UDP Cannon” bug.
- The Impact: Your real IP address is exposed, bypassing “Always-On VPN” and “Block connections without VPN” settings.
- The Requirement: An attacker must have a malicious app already installed on your device to trigger the leak.
- The Status: Google has declined to patch the bug; GrapheneOS has released a fix.
FAQ: Is Your Data at Risk?
Does this affect all VPN apps?
Yes. Because the vulnerability exists within the Android 16 operating system itself, it affects all VPN applications running on the platform. The flaw is not in the VPN software, but in how the OS handles the traffic.
Am I safe if I don’t install unknown apps?
If you only install trusted applications from official sources and maintain strict app permissions, your risk is significantly lower. However, the vulnerability remains a systemic weakness for any user on Android 16.
How can I fix this on a standard Android device?
Currently, there is no official patch from Google. Users seeking a resolution would need to switch to a privacy-focused distribution like GrapheneOS or wait to see if Google reverses its “Won’t Fix” decision following community pressure.
Final Outlook
The “Tiny UDP Cannon” incident underscores a recurring theme in mobile security: the gap between “functional” security and “absolute” security. While Google views the requirement of a malicious app as a sufficient safeguard, the privacy community views any predictable leak as an unacceptable failure. As Android 16 continues to roll out, this event serves as a reminder that the OS’s built-in privacy toggles are not always infallible.