Exploiting Coprocessors to Achieve Deterministic Kernel Exploitation on A9/A11 Devices

2025-07-20

An updated version of the Trigon kernel exploit has been released, expanding support to A9(X) and A11 devices. This blog post details the challenging techniques used to overcome KTRR limitations and find the kernel base address across different devices. The new approach leverages the IORVBAR register and coprocessors (specifically the Always-On Processor), manipulating coprocessor firmware to achieve arbitrary kernel read/write, ultimately bypassing kernel protections for successful exploitation on A9 and A11 devices.

Development coprocessor