GrapheneOS patches Android VPN loophole

Android VPN – GrapheneOS fixes a VPN leak path in Android 16 that could expose your IP address under strict VPN lockdown settings.
A VPN “lockdown” that can still leak traffic is the kind of bug privacy teams fear most, and Misryoum reports that GrapheneOS has moved to close one such gap in Android 16.
The issue centers on a flaw that could allow a malicious app to send small amounts of data outside an active VPN tunnel. In worst-case scenarios, that tiny leak could be enough to reveal the device’s real IP address, undermining the very reason many people turn on always-on protection.
GrapheneOS says it addressed the problem in its Android 16-based releases, effectively disabling the underlying networking behavior involved in the leak. Misryoum notes that the workaround is notable because it targets the mechanism, not just the symptoms.
Insight: Even if the chance of exploitation depends on installing a malicious app, the bigger problem is trust. When VPN lockdown controls are designed to prevent any non-tunneled traffic, a bypass path changes how confidently users can rely on that promise.
The bug has been described as affecting Android 16 networking. where a connection-closing optimization may fail to enforce the VPN restriction for a very small packet of traffic.. The researcher’s view is that the data could be crafted so it contains sensitive connection details. potentially including an IP address.
While this does not turn every Android phone into an immediate exposure risk. it does raise uncomfortable questions about edge cases.. Misryoum also highlights that the behavior reportedly persists even with the strictest VPN lockdown-style settings enabled. such as always-on VPN and blocking connections that aren’t going through the tunnel.
Insight: This is the difference between “usually safe” and “designed to be safe.” Security products often focus on common flows, but privacy protection lives and dies on rare failure modes and boundary conditions.
In contrast to GrapheneOS’s response, Misryoum reports that Google’s Android security process classified the issue as not being fixed for a security bulletin, citing infeasibility. For stock Android users, that leaves the situation without an immediate, official patch.
As a result. the practical takeaway for Android privacy watchers is clear: hardened operating systems may close leaks faster by removing risky functionality outright. while mainstream updates can lag on narrow but consequential scenarios.. Misryoum also notes that the underlying feature can be disabled manually via an ADB command. though that approach is not a plug-and-play solution for most people.
Insight: Bugs like this rarely make headlines because they’re narrow, but they matter because VPNs are meant to be an all-or-nothing privacy layer. When edge-case paths exist, users ultimately need both timely fixes and clear expectations about residual risk.