Express VPN has updated its Windows app to patch a risk that can expose the user’s IP address in front of observers.
As one of the best VPNS, Express VPN is very safe but there can be errors. The provider said in a blog post that the code means “mistakenly adds it to production.”
The users were affected only in certain circumstances, but the problem means that traffic was not being rooted through VPN tunnels as expected – however, the encryption did not have any effect.
You can like
Express VPN has worked fast to fix the risk and recommends upgrading all its Windows VPN users to the latest version of the app.
The code for internal testing found its way from production blood version 12.97 to 12.101.0.2-Beta.
Security researcher Adam-X told the Express VPN in April 2025 through the Provider’s Big Grace Program-where security researchers could receive cash prizes to report the risks and flaws.
Express VPN said his team confirmed the report within hours and tried.
The remote desktop is central to the protocol (RDP). According to Express VPN, when only RDP connection was used or when other TCP traffic was rooted at Port 3389, there was only one risk.
Express VPN said, “If a user sets up a connection using the RDP, the traffic VPN can ignore the tunnel.”
“This did not affect the encryption, but that meant that the RDP contacts through Express VPN did not get traffic.”
It added that observers like Internet service providers could see that the user was connected to Express VPN and they are using RDP to access remote servers – information that will be generally secure.
RDP is most commonly used in the enterprise environment, and that is why most users were not affected. However, Express VPN said it “Any of privacy calls any threat unacceptable.”
A fix was released five days later in version 12.101.0.45. The researcher confirmed that the issue was resolved and that Express VPN closed the report in late June.
(Image Credit: Sopa Images / Getty Images)
How hard it could have been?
Express VPN analyzed these issues and believed that “the possibility of exploitation of the real world was very low.”
Given the fact that the majority of Express VPN users are contrary to enterprise users, the provider said that “the number of affected users is low.”
They will need to be aware of a hacker, to be aware of the bug and find a way to traffic at Port 3389. This can be done to launch a drive bid attack by cheating on a user by clicking on a malicious link or compromising on a popular website-when the user was connected to VPN.
As the Adam-X has shown, the user’s original IP address may be revealed. But the activity of browsing could not be seen and the encryption was not compromised.
Express VPN said it was grateful to his community that he was grateful for it to inform him of possible issues and suggest improvement. The provider will strengthen his internal safety measures to ensure that this does not happen again.
Today’s Best Express VPN deals
We test and evaluate VPN services in the context of legal recreation. For example: 1. Access to a service from another country (subject to the terms and conditions of this service). 2. When abroad, protect your online security and strengthen your online privacy. We do not support or condole the illegal or malicious use of VPN services. The use of pirate materials is not verified, nor is it verified or approved by future publication.


