Android Bug Leaks DNS Traffic to Hackers While Switching VPN Servers
- С сайта: Vulnerability(cybersecuritynews.com)
- Вернуться к списку новостей
Android Bug Leaks DNS Traffic to Hackers While Switching VPN Servers
Author: Guru BaranAndroid’s operating system has identified a critical vulnerability that allows DNS traffic to leak during VPN server switches, potentially exposing users’ internet activity to cybercriminals.
The issue, which affects multiple versions of Android, including the latest Android 14, was first reported by a user on Reddit and subsequently confirmed by Mullvad VPN through an internal investigation.
The vulnerability was uncovered when a user noticed DNS queries leaking while toggling a VPN connection on and off, despite having the “Block connections without VPN” setting enabled.
Mullvad VPN’s subsequent investigation revealed that this was not an isolated incident but part of a broader issue within the Android OS.
Android Bug Leaks DNS Traffic
The DNS leaks occur under specific conditions:
- When a VPN is active, no DNS server is configured.
- During brief periods when a VPN app is reconfiguring the tunnel or if it crashes.
The leaks are primarily associated with direct calls to the C function getaddrinfo. Applications that resolve domain names using this method, such as the Chrome browser, are particularly susceptible to leaking DNS queries in the scenarios described.
📁🄳🄾🄲🅄🄼🄴🄽🅃
The leakage of DNS queries poses significant privacy risks, as DNS traffic can reveal the websites a user visits and the apps they use.
This vulnerability is especially concerning because it can be exploited regardless of security measures like “Always-on VPN” and “Block connections without VPN,” designed to enhance user privacy.
In response to these findings, Mullvad VPN has announced plans to implement a temporary workaround by setting a bogus DNS server in its app’s blocking state to prevent DNS leaks until the issue is resolved upstream in the Android OS.
They also urge other developers and service providers to review their applications and implement similar safeguards if necessary.
This incident highlights the need for continuous vigilance and prompt action in the digital security landscape. Android users are advised to:
- Ensure their VPN applications are up-to-date and configured correctly.
- Monitor for any updates from their VPN service providers regarding this issue.
- Stay informed about potential security vulnerabilities and how to mitigate them.
Google has yet to respond to the findings, but updates to the Android OS are anticipated as the community calls for a resolution to prevent future privacy breaches.
#Cyber_Security_News #Vulnerability #cyber_security #cyber_security_news #vulnerability
Оригинальная версия на сайте: