CVE-2018-11922

9.8 CRITICAL

📋 TL;DR

The Touch Pal application on Qualcomm devices was configured to collect user behavior data without user consent or awareness. This affects users of Android devices with Qualcomm chipsets running vulnerable versions of the Touch Pal application.

💻 Affected Systems

Products:
  • Touch Pal application on Qualcomm-based Android devices
Versions: Versions prior to May 2018 security updates
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: Affects devices with Qualcomm chipsets where Touch Pal is pre-installed or installed as a keyboard/input method application.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Mass collection of sensitive user behavior data including keystrokes, app usage, and personal information without user knowledge, leading to privacy violations and potential credential theft.

🟠

Likely Case

Unauthorized collection of user activity data for analytics or advertising purposes without proper disclosure or consent.

🟢

If Mitigated

Limited data collection with proper user awareness and consent mechanisms in place.

🌐 Internet-Facing: MEDIUM - Data collection typically requires internet connectivity to transmit collected information to remote servers.
🏢 Internal Only: LOW - The vulnerability primarily affects data privacy rather than internal network security.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability is inherent in the application's configuration, requiring no special exploitation techniques.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: May 2018 Android security patch level or later

Vendor Advisory: https://docs.qualcomm.com/product/publicresources/securitybulletin/may-2018-bulletin.html

Restart Required: Yes

Instructions:

1. Check for Android system updates in Settings > System > System Update. 2. Install May 2018 or later security patches. 3. Restart device after installation. 4. Verify Touch Pal app is updated through Google Play Store if available.

🔧 Temporary Workarounds

Disable Touch Pal Input Method

android

Switch to a different keyboard/input method and disable Touch Pal permissions

Settings > System > Languages & input > Virtual keyboard > Manage keyboards > Disable Touch Pal

Uninstall Touch Pal Application

android

Remove the vulnerable application completely if not required

Settings > Apps > Touch Pal > Uninstall

🧯 If You Can't Patch

  • Disable network permissions for Touch Pal application to prevent data exfiltration
  • Use device firewall or network filtering to block Touch Pal application internet access

🔍 How to Verify

Check if Vulnerable:

Check Android security patch level in Settings > About phone > Android security patch level. If date is before May 2018, device is vulnerable.

Check Version:

Settings > About phone > Android security patch level

Verify Fix Applied:

Verify Android security patch level shows May 2018 or later date. Check Touch Pal app version in Google Play Store for updates.

📡 Detection & Monitoring

Log Indicators:

  • Unusual network traffic from Touch Pal application
  • Data collection events in application logs

Network Indicators:

  • Outbound connections from Touch Pal app to analytics or tracking domains
  • Unencrypted data transmission containing user behavior data

SIEM Query:

source="android_device" app="Touch Pal" (event_type="data_collection" OR dest_ip IN [analytics_domains])

🔗 References

📤 Share & Export