The bug is due to Apple’s iOS not terminating all existing Internet connections when the user connects to a VPN and having them automatically reconnect to the destination servers after the VPN tunnel is established. “Most connections are short-lived and will eventually be re-established through the VPN tunnel on their own,” ProtonVPN explains. “However, some are long-lasting and can remain open for minutes to hours outside the VPN tunnel.” During the time the connections are outside of the VPN secure communication channels, this issue can lead to serious consequences. For instance, user data could be exposed to third parties if the connections are not encrypted themselves, and IP address leaks could potentially reveal the users’ location or expose them and destination servers to attacks. Until Apple provides a fix, the company recommends using Always-on VPN to mitigate this problem. “However, since this workaround uses device management, it cannot be used to mitigate the vulnerability for third-party VPN apps such as ProtonVPN,” the report adds.
Read more of this story at Slashdot.