Description
GrapheneOS before 2026050400 allows attackers to discover the real IP address of a VPN user as a consequence of a registerQuicConnectionClosePayload optimization, because an application can let system_server transmit UDP traffic on its behalf. This occurs when the "Block connections without VPN" and "Always-on VPN" settings are enabled.
Published: 2026-05-09
Score: 2.2 Low
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

GrapheneOS versions before 2026050400 allow an application to trigger a system component that transmits UDP traffic on its behalf, causing the real IP address of a VPN user to be exposed when both the "Block connections without VPN" and "Always‑on VPN" settings are enabled. This occurs because of an optimization in registerQuicConnectionClosePayload. The vulnerability does not enable arbitrary code execution, but it does leak the user’s non‑VPN IP to entities that can observe the outgoing traffic. The likely attack vector is a local attacker who can install or control an application that invokes this vulnerability; remote exploitation would require such an application to be present on the device. Based on the description, it is inferred that the exposure is limited to the device’s network layer and is not a direct privilege escalation or data exfiltration risk.

Affected Systems

GrapheneOS releases earlier than build 2026050400 are affected. Devices running any older build may disclose a user’s real IP address when both the block‑connection and always‑on VPN settings are active. No specific hardware variants are mentioned, so any device that runs an affected build with these settings enabled is at risk.

Risk and Exploitability

The CVSS score of 2.2 indicates a low severity vulnerability. The EPSS score is not available, and the vulnerability is not listed in CISA’s KEV catalog, suggesting a low likelihood of widespread exploitation. Because the weakness relies on a local application to trigger the vulnerable system call, the exploitation probability is limited to users who install malicious apps or are otherwise exposed to local attacker capabilities. The risk is therefore primarily privacy‑related exposure of the device’s real IP address.

Generated by OpenCVE AI on May 10, 2026 at 00:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update your device to GrapheneOS 2026050400 or a later release that contains the fix for the registerQuicConnectionClosePayload optimization.
  • As a temporary workaround, disable either the "Always‑on VPN" setting or the "Block connections without VPN" setting until the patch is applied.
  • If your workflow requires both settings, consider using a different VPN solution that does not rely on the system_server UDP path until a permanent fix is released.

Generated by OpenCVE AI on May 10, 2026 at 00:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sun, 10 May 2026 00:30:00 +0000

Type Values Removed Values Added
Title Android VPN IP Leakage via System Server UDP Path

Sat, 09 May 2026 22:30:00 +0000

Type Values Removed Values Added
Description GrapheneOS before 2026050400 allows attackers to discover the real IP address of a VPN user as a consequence of a registerQuicConnectionClosePayload optimization, because an application can let system_server transmit UDP traffic on its behalf. This occurs when the "Block connections without VPN" and "Always-on VPN" settings are enabled.
Weaknesses CWE-441
References
Metrics cvssV3_1

{'score': 2.2, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-05-09T22:12:55.615Z

Reserved: 2026-05-09T22:07:58.636Z

Link: CVE-2026-45182

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-09T23:16:32.277

Modified: 2026-05-09T23:16:32.277

Link: CVE-2026-45182

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-10T00:30:05Z

Weaknesses