CVE-2024-34446: n/a
Mullvad VPN through 2024.1 on Android does not set a DNS server in the blocking state (after a hard failure to create a tunnel), and thus DNS traffic can leave the device. Data showing that the affected device was the origin of sensitive DNS requests may be observed and logged by operators of unintended DNS servers.
AI Analysis
Technical Summary
CVE-2024-34446 is a vulnerability in Mullvad VPN for Android devices through version 2024.1, where the VPN client fails to properly handle DNS server settings after a hard failure to establish a VPN tunnel. Specifically, when the tunnel creation fails, the application does not set the DNS server into a blocking state, which would normally prevent DNS traffic from leaving the device outside the VPN tunnel. As a result, DNS queries can be sent directly to external DNS servers rather than being routed securely through the VPN. This leakage exposes sensitive DNS request data, which can reveal user browsing habits, device origin, or other metadata to unintended DNS operators or network observers. The vulnerability is classified under CWE-923 (Improper Neutralization of Special Elements in Output Used by a Downstream Component), indicating a failure in controlling how DNS traffic is handled post-failure. The CVSS 3.1 base score is 7.5, reflecting a network attack vector, low attack complexity, no privileges or user interaction required, and a high impact on confidentiality. No integrity or availability impacts are noted. No patches or exploits are currently documented, but the vulnerability poses a significant privacy risk for users relying on Mullvad VPN on Android. The issue highlights the importance of fail-safe DNS handling in VPN clients to prevent data leakage during connection failures.
Potential Impact
The primary impact of CVE-2024-34446 is the compromise of user privacy and confidentiality. Sensitive DNS queries, which can reveal visited domains, user interests, or device location, may be exposed to external DNS servers or network adversaries. This undermines the fundamental privacy guarantees of using a VPN, especially for users relying on Mullvad VPN for anonymity or secure communications. Organizations using Mullvad VPN on Android for secure remote access or privacy protection may face data leakage risks that could lead to targeted surveillance, profiling, or exposure of sensitive operational details. Although the vulnerability does not affect data integrity or availability, the confidentiality breach can have severe consequences in high-risk environments such as journalism, activism, or corporate espionage. The ease of exploitation—requiring no privileges or user interaction—means that any network observer can potentially capture leaked DNS traffic. This broadens the scope of affected systems to all Android devices running the vulnerable Mullvad VPN versions, increasing the global risk footprint.
Mitigation Recommendations
To mitigate CVE-2024-34446, users and organizations should: 1) Monitor Mullvad VPN updates closely and apply patches immediately once available to ensure proper DNS blocking after tunnel failures. 2) Temporarily disable Mullvad VPN on Android devices if sensitive DNS leakage is unacceptable until a fix is released. 3) Use additional DNS leak protection tools or configure device-level firewall rules to block DNS traffic outside the VPN tunnel. 4) Employ DNS over HTTPS (DoH) or DNS over TLS (DoT) where possible to encrypt DNS queries, reducing exposure even if leakage occurs. 5) Conduct regular network traffic analysis to detect unexpected DNS requests leaving the device. 6) Consider alternative VPN clients with verified DNS leak protections for critical use cases. 7) Educate users about the risk of DNS leaks and encourage cautious use of VPNs during connection failures. These measures go beyond generic advice by focusing on immediate containment of DNS leakage and proactive monitoring until official patches are deployed.
Affected Countries
United States, Germany, Sweden, United Kingdom, Canada, Netherlands, France, Australia, Japan, South Korea
CVE-2024-34446: n/a
Description
Mullvad VPN through 2024.1 on Android does not set a DNS server in the blocking state (after a hard failure to create a tunnel), and thus DNS traffic can leave the device. Data showing that the affected device was the origin of sensitive DNS requests may be observed and logged by operators of unintended DNS servers.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-34446 is a vulnerability in Mullvad VPN for Android devices through version 2024.1, where the VPN client fails to properly handle DNS server settings after a hard failure to establish a VPN tunnel. Specifically, when the tunnel creation fails, the application does not set the DNS server into a blocking state, which would normally prevent DNS traffic from leaving the device outside the VPN tunnel. As a result, DNS queries can be sent directly to external DNS servers rather than being routed securely through the VPN. This leakage exposes sensitive DNS request data, which can reveal user browsing habits, device origin, or other metadata to unintended DNS operators or network observers. The vulnerability is classified under CWE-923 (Improper Neutralization of Special Elements in Output Used by a Downstream Component), indicating a failure in controlling how DNS traffic is handled post-failure. The CVSS 3.1 base score is 7.5, reflecting a network attack vector, low attack complexity, no privileges or user interaction required, and a high impact on confidentiality. No integrity or availability impacts are noted. No patches or exploits are currently documented, but the vulnerability poses a significant privacy risk for users relying on Mullvad VPN on Android. The issue highlights the importance of fail-safe DNS handling in VPN clients to prevent data leakage during connection failures.
Potential Impact
The primary impact of CVE-2024-34446 is the compromise of user privacy and confidentiality. Sensitive DNS queries, which can reveal visited domains, user interests, or device location, may be exposed to external DNS servers or network adversaries. This undermines the fundamental privacy guarantees of using a VPN, especially for users relying on Mullvad VPN for anonymity or secure communications. Organizations using Mullvad VPN on Android for secure remote access or privacy protection may face data leakage risks that could lead to targeted surveillance, profiling, or exposure of sensitive operational details. Although the vulnerability does not affect data integrity or availability, the confidentiality breach can have severe consequences in high-risk environments such as journalism, activism, or corporate espionage. The ease of exploitation—requiring no privileges or user interaction—means that any network observer can potentially capture leaked DNS traffic. This broadens the scope of affected systems to all Android devices running the vulnerable Mullvad VPN versions, increasing the global risk footprint.
Mitigation Recommendations
To mitigate CVE-2024-34446, users and organizations should: 1) Monitor Mullvad VPN updates closely and apply patches immediately once available to ensure proper DNS blocking after tunnel failures. 2) Temporarily disable Mullvad VPN on Android devices if sensitive DNS leakage is unacceptable until a fix is released. 3) Use additional DNS leak protection tools or configure device-level firewall rules to block DNS traffic outside the VPN tunnel. 4) Employ DNS over HTTPS (DoH) or DNS over TLS (DoT) where possible to encrypt DNS queries, reducing exposure even if leakage occurs. 5) Conduct regular network traffic analysis to detect unexpected DNS requests leaving the device. 6) Consider alternative VPN clients with verified DNS leak protections for critical use cases. 7) Educate users about the risk of DNS leaks and encourage cautious use of VPNs during connection failures. These measures go beyond generic advice by focusing on immediate containment of DNS leakage and proactive monitoring until official patches are deployed.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-05-03T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6c4fb7ef31ef0b562288
Added to database: 2/25/2026, 9:40:31 PM
Last enriched: 3/4/2026, 11:17:34 PM
Last updated: 4/12/2026, 3:35:07 PM
Views: 14
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.