Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-34446: n/a

0
High
VulnerabilityCVE-2024-34446cvecve-2024-34446
Published: Fri May 03 2024 (05/03/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

Mullvad VPN through 2024.1 on Android does not set a DNS server in the blocking state (after a hard failure to create a tunnel), and thus DNS traffic can leave the device. Data showing that the affected device was the origin of sensitive DNS requests may be observed and logged by operators of unintended DNS servers.

AI-Powered Analysis

AILast updated: 02/25/2026, 21:45:35 UTC

Technical Analysis

CVE-2024-34446 is a vulnerability in Mullvad VPN for Android (up to version 2024.1) where the application fails to properly handle DNS server settings after a hard failure to create a VPN tunnel. Normally, VPN clients route DNS traffic through the encrypted tunnel to prevent DNS leaks. However, due to this flaw, when the tunnel creation fails, the VPN client does not set the DNS server in a blocking state, allowing DNS queries to be sent directly from the device to external DNS servers outside the VPN tunnel. This results in DNS leakage, exposing potentially sensitive DNS requests that can reveal user browsing behavior, device origin, or other metadata to unintended DNS operators. The vulnerability is classified under CWE-923 (Improper Neutralization of DNS Resolution). The CVSS 3.1 base score is 7.5 (high), reflecting network attack vector, low complexity, no privileges or user interaction required, and high confidentiality impact. Although no exploits have been reported in the wild, the vulnerability undermines the core privacy guarantees of the VPN service. The issue affects all Android users running Mullvad VPN through version 2024.1, and the lack of a patch at the time of disclosure necessitates immediate mitigation efforts by users and organizations relying on this VPN for secure communications.

Potential Impact

The primary impact of CVE-2024-34446 is the compromise of user privacy and confidentiality. DNS leakage can allow adversaries, including ISPs, network operators, or malicious DNS servers, to observe DNS queries that reveal visited domains, potentially exposing sensitive user activity despite the use of a VPN. This undermines the trust in Mullvad VPN's ability to anonymize and secure user traffic. For organizations, this leakage could lead to exposure of internal domain queries or user behavior patterns, increasing the risk of targeted attacks or surveillance. The vulnerability does not affect data integrity or availability but significantly impacts confidentiality. Given the widespread use of Mullvad VPN among privacy-conscious users and activists, the risk of surveillance and data collection is heightened. The ease of exploitation (no authentication or user interaction needed) and the broad scope of affected devices (all Android devices running the vulnerable versions) increase the potential scale of impact globally.

Mitigation Recommendations

Until an official patch is released by Mullvad VPN, users should consider the following mitigations: 1) Temporarily disable Mullvad VPN on Android devices if DNS privacy is critical, or switch to alternative VPN clients with verified DNS leak protection. 2) Use system-level DNS leak protection features if available, such as configuring DNS over HTTPS (DoH) or DNS over TLS (DoT) at the device level to prevent DNS queries from leaking outside the VPN tunnel. 3) Monitor network traffic for DNS leaks using tools or apps that detect DNS queries sent outside the VPN tunnel. 4) Avoid connecting to untrusted networks where DNS leakage could be exploited for surveillance. 5) Follow Mullvad VPN announcements closely and apply updates immediately once a patch addressing this vulnerability is released. 6) For organizations, enforce endpoint security policies that include DNS leak detection and VPN client version controls to prevent use of vulnerable versions.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-05-03T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c4fb7ef31ef0b562288

Added to database: 2/25/2026, 9:40:31 PM

Last enriched: 2/25/2026, 9:45:35 PM

Last updated: 2/26/2026, 9:57:21 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats