• Thread Author
Microsoft has issued a coordinated warning: the original Secure Boot certificates that have underpinned Windows platform integrity since 2011 are reaching the end of their lifecycle, and a deliberate, ecosystem-wide refresh is required before mid‑2026 to avoid a progressive loss of firmware‑level protections.

Glowing shield icon for Secure Boot beside a firmware UI panel on a circuit board.Background / Overview​

Secure Boot is a firmware‑level trust anchor built into the UEFI specification that prevents unsigned or tampered pre‑OS software from executing during the earliest stages of system startup. It does this by validating signatures against a small set of certificates and keys stored in UEFI variables commonly referred to as PK, KEK, DB, and DBX. Those cryptographic trust anchors determine whether a bootloader, option ROM, or other EFI application is allowed to run.
When Microsoft and OEMs introduced the Secure Boot ecosystem for Windows 8 and Windows Server 2012, they provisioned a standardized set of Microsoft‑issued certificate authorities (the “2011” CAs) into device firmware. Those same certificates have been used industry‑wide for more than 15 years. Cryptographic certificates, however, are explicitly time‑bound; when a root CA reaches expiration it can no longer validate or authorize subsequent updates to Secure Boot databases and revocation lists. Microsoft’s guidance makes clear the 2011 certificates begin expiring in June 2026, with expirations completing by October 2026 unless systems are updated.

What is expiring — the technical picture​

At a technical level, three Microsoft‑shipped certificate authorities embedded in many UEFI firmwares are the focus of the refresh:
  • Microsoft Corporation KEK CA 2011 — stored in KEK; authorizes updates to the DB and DBX.
  • Microsoft UEFI CA 2011 — stored in DB; used to validate third‑party bootloaders, EFI apps and option ROMs.
  • Microsoft Windows Production PCA 2011 — stored in DB; used to sign Windows boot components.
Microsoft and ecosystem partners issued a matched set of new 2023 certificates to replace (or supplement) these 2011 CAs. The new certificate family intentionally splits signing roles to reduce blast radius and give administrators and OEMs finer control. Examples include Microsoft Corporation KEK 2K CA 2023, Windows UEFI CA 2023, Microsoft UEFI CA 2023, and Microsoft Option ROM UEFI CA 2023. Devices shipped since 2024 increasingly include these 2023 certs in firmware, and Microsoft is using staged Windows servicing to inject the new certificates into compatible devices where allowed.

Timeline and scope — exact dates you must track​

  • June 2026 — the 2011 certificate authorities begin their expiration window; several entries in KEK/DB start lapsing.
  • October 2026 — the remaining 2011 certificate (Microsoft Windows Production PCA 2011) is scheduled to expire by this date if devices have not adopted the 2023 replacements.
These are not hypothetical calendar notes. Microsoft’s official posts and support documentation place concrete date windows in mid‑ to late‑2026 and explicitly state that devices still relying solely on the 2011 CAs will enter what Microsoft calls a “degraded security state.” In that state a device will still boot and run, but will no longer be able to accept new signed updates to the boot manager, revocation updates (DBX), and other early‑boot mitigations. Over time that inability to receive new protections widens the window for unfixable boot‑level exposures.

How Microsoft and OEMs are delivering the update​

Microsoft’s rollout is deliberately layered and collaborative:
  • OS‑side enrollment via Windows Update: Where hardware and firmware permit, Windows cumulative and servicing updates will write the new 2023 certificate variables into UEFI NVRAM. Microsoft has staged the deployment and uses telemetry and eligibility signals to limit changes to devices showing stable update health. This is the default path for most consumer and managed devices.
  • OEM firmware updates: For platforms where OEMs must provision certificates in firmware (for example, air‑gapped systems, specialized servers, or devices that prevent OS‑side writes), vendors will ship BIOS/UEFI updates that include the new certs. Major OEMs have published targeted guidance and lists of affected models and minimum firmware versions.
  • Scope controls for enterprise: Microsoft’s servicing guidance explains that enterprises can control, schedule, and validate the delivery using their management tooling (Intune, ConfigMgr, third‑party patching systems). Microsoft’s ESU policy also affects Windows 10 devices: systems no longer under mainstream support will only receive these certificate updates if enrolled and entitled under Extended Security Updates programs.
The staged approach reduces the risk of mass firmware incompatibility, but it creates a finite operational window during which diligence, inventory and targeted remediation are required.

Why this matters: security consequences and real‑world risk​

The immediate technical consequence of expired CA certs is that Microsoft (and the wider UEFI trust ecosystem) can no longer cryptographically authorize updates to the Secure Boot allow‑list (DB) or revocation list (DBX) using those certs. Practically that means:
  • The platform loses the ability to receive future boot‑level mitigations delivered as signed updates.
  • Microsoft cannot revoke compromised boot components on that device if the revocation list signing path depends on the expired cert.
  • Compatibility problems may arise later: new OS builds, drivers, virtualization features, or anti‑cheat/anti‑tamper modules that expect modern Secure Boot roots might refuse to load on systems relying on expired certs.
This is not theoretical. Supply‑chain incidents such as the PKfail discoveries in 2024 exposed how fragile firmware trust can be when keys are mismanaged. PKfail documented widespread reuse of test or leaked Platform Keys that allowed researchers to show how an attacker with the private key could subvert Secure Boot on affected devices. The incident underlined the need for proactive key rotation, better firmware hygiene by OEMs, and fast revocation mechanisms — precisely the problems a certificate expiry window can make harder to manage if devices are neglected.

Who is affected — and who is already safe​

  • Generally safe: Most modern consumer PCs purchased in 2024 and 2025 already include the 2023 certs in firmware from the factory, and therefore require no action. Microsoft’s telemetry‑guided rollout also aims to update a large portion of supported Windows 11 devices automatically.
  • At risk:
  • Older consumer PCs whose OEMs have stopped issuing firmware updates.
  • Windows 10 machines not enrolled in Extended Security Updates (ESU) or otherwise outside Microsoft servicing.
  • Specialized equipment (certain servers, appliances, point‑of‑sale units, some IoT devices) that rely on vendor‑managed firmware and that may require manual OEM updates.
  • Air‑gapped systems and locked down fleets where Windows Update does not have permission to write UEFI variables.
Microsoft and multiple OEMs have warned that, while an affected PC will typically continue to boot after the 2011 CAs expire, it will progressively lose the ability to receive protective updates for the early boot chain and may fall out of compliance with security baselines. That is the essence of the “degraded security state” warning.

Practical checks — how to confirm whether your PC already has the 2023 certificates​

Administrators and power users can verify certificate presence using straightforward checks. Run PowerShell as Administrator and use these quick tests:
  • Check the active DB (what the system uses to validate boot components):
  • ([System.Text.Encoding]::ASCII.GetString((Get‑SecureBootUEFI db).bytes) -match 'Windows UEFI CA 2023')
  • Check the default DB baked into firmware (survives a firmware reset):
  • ([System.Text.Encoding]::ASCII.GetString((Get‑SecureBootUEFI dbdefault).bytes) -match 'Windows UEFI CA 2023')
A returned value of True means the 2023 certificate is present in that UEFI variable. Many OEMs (Dell, HP, Lenovo, Asus and others) have published identical checks and scripts to inventory fleets at scale. Use PowerShell remoting, ConfigMgr/Intune scripts, or your central automation to run these at fleet scale and collect results centrally.
Important practical notes:
  • If the 2023 cert is present in firmware’s default DB, it will survive a Secure Boot reset and BIOS defaults. If it’s only present in the active DB and not in dbdefault, a BIOS reset could revert the system to the older cert state until firmware is updated.
  • For managed fleets, temporarily suspending BitLocker before firmware writes (where recommended by OEM guidance) is a common best practice to avoid recovery prompts during the update.

Recommended remediation checklist (admins and power users)​

Follow this prioritized list to reduce operational and security risk before June–October 2026:
  • Inventory all UEFI/BIOS‑based endpoints (desktop, laptop, server, appliances). Confirm which machines have Secure Boot enabled and whether the 2023 certs are present. Use PowerShell checks and your management platform to collect results.
  • Prioritize remediation for internet‑facing systems, critical servers, and machines with sensitive workloads (developer workstations, build servers, and gaming rigs with anti‑cheat components).
  • Ensure devices are online and receiving Windows updates (or enrolled in ESU where applicable) and that the device update telemetry signals are intact so Microsoft’s staged rollout can target them.
  • Coordinate with OEMs for platforms that require firmware updates; apply BIOS/UEFI updates that include the new certs. Confirm manufacturer lists of affected models and minimum firmware versions before mass deployment.
  • Validate after update: verify db and dbdefault contain Windows UEFI CA 2023 (or equivalent 2023 entries), and run boot/restore tests to confirm recovery images and WinPE environments still boot correctly.
  • For air‑gapped and restricted systems, establish an offline update plan with OEM firmware images and controlled enrollment procedures. Test thoroughly in a lab first.
  • Document and automate: capture results in your CMDB, create alerts for machines still using 2011 certs after a deadline, and schedule follow‑up audits at fixed intervals.

Operational risks and edge cases to watch closely​

  • Firmware write failures and BitLocker: Updating UEFI variables can trigger BitLocker recovery if keys are not suspended or if the firmware changes flag a change in the platform. Follow OEM guidance to avoid recovery storms across fleets.
  • Servers and specialized hardware: Some server platforms and embedded appliances either restrict OS‑side updates or do not support the enrollment mechanism Microsoft uses. For those systems, the only path is an OEM firmware update, and in some cases vendors may no longer support legacy platforms. Plan for replacement or isolation where firmware updates are unobtainable.
  • Anti‑cheat and DRM interactions: Because anti‑cheat, virtualization and DRM stacks often rely on early‑boot integrity signals, compatibility issues may appear for systems still on expired certs when those stacks evolve to rely on the 2023 roots. Expect game publishers and some platform vendors to require modern Secure Boot roots for future versions.
  • Air‑gapped fleets and isolated OT networks: These systems are the hardest to reach and the most likely to remain with 2011 certs inadvertently. Create an offline remediation path and test firmware provisioning thoroughly in a preproduction environment.
  • Unverifiable edge claims: If you discover third‑party guidance claiming the expiration will “brick” all PCs or that certificates will cause immediate failures without context, treat those as sensationalized. Microsoft’s documentation explicitly states devices will continue to boot but lose updateability for the early boot chain unless remediated. Always cross‑check alarming claims against official guidance.

Why Microsoft’s approach is the right engineering choice — and its limits​

Strengths
  • Proactive cryptographic hygiene: Rotating long‑lived CAs is best practice and reduces the window that an aged credential can become a systemic weakness. Microsoft, OEMs, and the UEFI community are following accepted lifecycle principles to refresh keys before they expire.
  • Split of roles in 2023 certs: Splitting signing responsibilities (boot manager vs option ROMs, etc.) reduces attack blast radius and gives firmware owners finer control over third‑party code privileges. That is an important architectural improvement.
  • Staged, telemetry‑informed rollout: Using staged deployment reduces the chance of widespread firmware incompatibilities and lets Microsoft target only devices that show safe update telemetry. This is prudent for a change that writes to firmware NVRAM.
Limitations and residual risks
  • Firmware fragmentation: The UEFI ecosystem is diverse. Not every vendor or platform supports an OS‑side enrollment pathway, and many legacy systems are out of firmware support — those systems remain a long‑term exposure unless replaced.
  • Operational complexity: Firmware updates, BitLocker management, and testing recovery/WinPE images add real operational overhead. For smaller IT teams and home users, the task can be confusing and error‑prone without clear OEM scripts and step‑by‑step guidance.
  • Policy and compliance gaps: Organizations relying on strict change windows, air‑gapped policies, or regulators that require firmware change control must plan carefully; the certificate refresh is effectively a security baseline change with compliance implications.

Final recommendations — a short action plan you can implement this week​

  • If you manage endpoints at scale: schedule an inventory sweep now, run PowerShell checks across the estate, and open vendor ticket lists for any systems flagged as missing the 2023 certs. Prioritize servers, internet‑facing machines, and developer workstations.
  • If you are a power user or home user: run the two PowerShell checks described above. If your machine already returns True for the 2023 cert in db or dbdefault, you’re set. If not, check your OEM support site for a BIOS/UEFI update or ensure Windows Update is fully applied and that your device is supported by Microsoft servicing.
  • If you run specialized or air‑gapped systems: contact your vendor and schedule a firmware‑level remediation path well ahead of June 2026. Do not assume these devices will be automatically updated by Microsoft.
  • Test recovery and WinPE images now: rebuild and validate your recovery media against the updated Boot Manager after any firmware or Secure Boot variable change. A tested recovery path is the single best defense against update‑induced disruption.

Secure Boot certificate rotation is a large, cross‑industry maintenance event — perhaps one of the largest coordinated security maintenance efforts affecting the Windows ecosystem in a decade. Microsoft and its partners have engineered a cautious, multi‑vector rollout that minimizes immediate disruption, but the burden of proof for continuity rests with administrators, OEMs, and home users who must ensure devices adopt the 2023 trust anchors before the 2011 roots lapse. Treat this as scheduled security maintenance, audit your estate now, and prioritize remediation for unsupported, air‑gapped, or firmware‑outdated systems. The technical reality is simple: an expired CA won’t instantly brick your PC, but it will close the door on future boot‑level protections — and that is a door you do not want left open.

Source: TechSpot Windows Secure Boot certificates are expiring after more than 15 years
 

Microsoft has quietly started refreshing the Secure Boot certificate chain that underpins Windows platform security to prevent a looming trust break when Microsoft‑issued Secure Boot certificates first issued around 2011 begin to expire in mid‑2026.

Glowing Secure Boot shield atop a motherboard, flanked by PK/DB keys and a padlock, symbolizing firmware security.Background​

UEFI Secure Boot is the firmware‑level trust gate that runs before the operating system and verifies the authenticity of early boot code — bootloaders, shim binaries, option ROMs and other EFI applications. Its enforcement relies on a small set of cryptographic trust anchors stored in UEFI variables: the Platform Key (PK), the Key Exchange Keys (KEK), the allowed signatures database (DB), and the revoked signatures database (DBX). If those anchors expire or become mismatched with signatures used by updated components, firmware will generally still boot, but it can no longer accept newly signed pre‑OS components or reliably apply pre‑boot mitigations.
Microsoft’s original ecosystem CA entries — widely distributed Microsoft UEFI/KEK certificates from the 2010–2011 era — are scheduled to begin reaching the end of their validity window in June 2026, with at least one production PCA related to Windows boot signing expiring later in October 2026. Left unaddressed, the expiry of these trust anchors would freeze Secure Boot’s ability to accept new signed boot components and to receive in‑firmware mitigations, with real consequences for security and future platform compatibility.
To avoid that outcome, Microsoft prepared a replacement family of certificates issued in 2023 (the “2023” CA family, split into roles such as Windows UEFI CA 2023, Microsoft UEFI CA 2023, Microsoft Option ROM UEFI CA 2023 and Microsoft Corporation KEK 2K CA 2023) and began delivering them to supported devices through a careful, staged program that combines OS‑side delivery with OEM firmware updates.

What Microsoft is doing now​

Microsoft’s approach is deliberately cautious and multi‑layered: it uses Windows servicing channels to deliver the new CA family and the OS‑side enrollment logic, while coordinating with OEMs to supply firmware updates where the device firmware cannot be written to directly by the OS. The rollout is telemetry‑gated and order‑sensitive to avoid leaving devices in an untrusted or partially trusted state.
Key mechanics and goals:
  • The replacement 2023 CA family is being distributed via monthly cumulative updates and servicing packages for in‑support Windows versions; the OS includes logic to write the new certificates into UEFI variables on capable systems.
  • In situations where firmware blocks OS‑side writes (common for certain KEK changes or older devices), OEMs provide BIOS/UEFI updates that include the new certificates. Devices shipped since 2024 — and almost all systems shipped in 2025 — commonly already include the updated certs in firmware and therefore require no additional action.
  • The enrollment sequence is purposely ordered: add safe DB/DBX entries first, stage KEK replacements only when allowed by firmware policy, swap to a Windows boot manager signed under the new PCA only after readiness signals, and perform controlled restarts to finalize the handoff. This minimizes the chance of a mass outage caused by misordered certificate writes.
  • Microsoft has delivered the OS components needed for enrollment in specific cumulative updates (examples include January 2026 updates referenced for Windows 11 and Windows 10 ESU builds). Administrators are expected to use standard update management tools (Windows Update, WSUS, Microsoft Endpoint Manager, Group Policy, etc.) to control deployment within organizations.
Those mechanics mean that for the majority of modern devices the refresh will be automatic and invisible; for a small but operationally important subset (older devices, specialized servers, embedded and air‑gapped systems), firmware updates or administrative remediation may be required.

Why this matters: technical and security impacts​

Secure Boot is a first line of defense against bootkits and UEFI rootkits because it ensures only cryptographically signed, trusted code executes before the OS. When the root CAs that firmware uses to validate signatures expire, the device typically continues to boot, but it loses the ability to:
  • Accept newly signed pre‑OS binaries or updated platform components;
  • Receive OS‑driven pre‑boot mitigations (revocations added to DBX, updated shim binaries, new boot manager signatures);
  • Preserve forward compatibility with newer firmware and software components that rely on the refreshed signing chain.
In short, an expired chain of trust is a frozen chain of trust: non‑blocking immediately, but progressively weakening security posture and increasing exposure to evolving pre‑OS threat techniques. The practical implications — from hardened server platforms to gaming anti‑cheat systems — can be significant over time.
Historic boot‑level incidents such as BootHole and in‑the‑wild bootkit campaigns illustrate the risks that a functioning Secure Boot chain mitigates. The refresh preserves the platform’s ability to distribute revocations and mitigations should new boot‑time vulnerabilities be discovered.

Rollout realities and who is affected​

Most consumer and enterprise devices that are within standard support and receive Microsoft‑managed updates will be handled automatically via the Windows update plumbing. However, several real‑world conditions mean some devices will need attention:
  • Firmware that blocks OS writes to KEK/PK variables will require an OEM firmware update to add the 2023 certs. These devices will be targeted for firmware updates from vendors.
  • Older Windows 10 systems that are not enrolled in Extended Security Updates (ESU) will not receive the new certificates via Microsoft’s managed OS updates and therefore will not be able to complete the automated enrollment path. Administrators running unsupported OS versions should plan for hardware refresh, vendor remediation, or compensating controls.
  • Specialized, embedded or air‑gapped systems that do not have telemetry or network update paths will require manual inventory and one‑off remediation (firmware updates or vendor‑supplied signing changes).
  • Legacy modem drivers removed by KB5073724 (a January 2026 cumulative) illustrate that some seemingly small changes in a cumulative update can have outsized operational impacts for organizations running specialized hardware. Administrators need to inventory dependencies and plan alternative drivers or hardware replacement where necessary.
The key message: devices will continue to boot if they miss the certificate enrollment, but they will enter a degraded security state that prevents future Secure Boot updates and mitigations. Over time this increases attack surface and may introduce compatibility problems with newer OS or firmware changes.

Operational checklist — what IT teams should do now​

For most organizations the immediate work is validation and controlled rollout rather than emergency remediation. The following is a prioritized checklist you can use as a basis for an operational playbook.
  • Inventory and classify
  • Identify all Windows devices, their OS build and servicing state (winver).
  • Flag devices on unsupported OS (Windows 10 without ESU), LTSC images, or ESU enrollment status.
  • Confirm update readiness
  • Ensure Servicing Stack Updates (SSU) and required cumulative updates are applied to pilot machines before broader rollout.
  • Verify Secure Boot state and firmware write capability
  • Run PowerShell commands such as Confirm‑SecureBootUEFI and Get‑SecureBootUEFI to verify Secure Boot is enabled and firmware supports OS‑side writes where possible. Check event logs for enrollment activity.
  • Pilot in representative rings
  • Use a small pilot that represents your hardware diversity. Monitor enrollment events (UEFICA2023Status or equivalent telemetry) and event logs for errors.
  • Coordinate with OEMs for firmware updates
  • For systems that reject OS writes, obtain vendor UEFI/BIOS updates that include the 2023 CA family. Schedule firmware updates and test BitLocker recovery scenarios.
  • Prepare BitLocker recovery and rollback plans
  • Back up BitLocker recovery keys and ensure you have tested recovery workflows; firmware changes touching Secure Boot and KEK/PK can trigger BitLocker recovery on some configurations.
  • Document and remediate outliers
  • Create a triage list for devices that remain non‑compliant (air‑gapped, telemetry‑off, firmware unavailable). For critical systems, plan isolation and hardware replacement if vendor remediation is not available.
  • Communicate changes to stakeholders
  • Notify application owners, security teams, and business stakeholders about potential temporary behavior changes (recovery prompts, legacy device breakage) and coordinate testing windows.

Technical verifications and concrete specifics​

  • Certificate timeline: the 2011‑era Microsoft CA entries broadly begin to reach end‑of‑validity in June 2026, with at least one Windows production PCA expiring later in October 2026. These dates are the schedule driving Microsoft’s enrollment effort. Administrators planning remediations should assume June 2026 as the first hard deadline for the widely used 2011 entries.
  • KBs and update artifacts: Microsoft has delivered OS‑side enrollment logic and targeting metadata in recent cumulative updates; for example, January Patch Tuesday updates for Windows 11 and targeted Windows 10 ESU builds carry the necessary hooks. KB5073724 (Windows 10 cumulative referenced in January 2026) is an example of a package that prepares devices for the Secure Boot certificate renewal while also removing certain legacy drivers. Administrators should treat the relevant SSU + cumulative updates as prerequisites.
  • Certificate family names: Microsoft split the new 2023 certificate family into role‑specific CAs to give finer‑grained control (for example, separating bootloader signing from option ROM signing). Devices will receive entries such as Windows UEFI CA 2023 and Microsoft UEFI CA 2023 as part of the enrollment. These names reflect intended roles rather than new, public product names.
If you require the authoritative day‑level deadline for a particular device, consult the OEM’s advisory for that model — some vendor pages provide day‑level differences for when firmware will enforce certain changes. For fleet planning purposes, treat the mid‑June 2026 timeframe as the critical window to have enrollment capability in place.

Edge cases, risks, and known operational downsides​

No large‑scale firmware or signing change is risk‑free. Microsoft’s staged, telemetry‑gated approach reduces systemic risk, but several real operational pitfalls remain:
  • BitLocker and recovery prompts: firmware key changes and KEK swaps can provoke BitLocker recovery behavior on some systems. Backing up recovery keys and testing recovery flows is non‑negotiable.
  • Legacy hardware and removed drivers: KB5073724 removes four in‑box legacy modem drivers; organizations relying on legacy modems, fax hardware, or other retired peripherals may see disruption and must either source vendor drivers or plan for replacement.
  • Firmware diversity: the UEFI ecosystem is highly heterogeneous. Some vendors expose OS‑write capability for KEK/DB updates, others do not. That diversity creates recovery friction and manual remediation paths that must be budgeted and scheduled.
  • Third‑party software compatibility: custom boot managers, anti‑cheat systems or specialized pre‑OS toolchains can surface compatibility issues when boot signing changes. These are rare but real; test high‑risk endpoints (gaming rigs, lab systems, developer workstations) before wide deployment.
  • Unsupported OSes: Windows 10 systems outside Extended Security Updates will not receive the enrollment logic and therefore will remain at risk of entering a frozen trust state after the 2011 CAs lapse. Administrators using such OSes must plan for remediation or isolation.
Finally, treat any public claim that “there has been no exploitation” as time‑sensitive. The absence of public evidence is not evidence of absence; until devices are enrolled and inventories are complete, assume adversary opportunity exists. Flagging such claims as time‑sensitive helps maintain an appropriate operational posture.

Practical remediation patterns for common environments​

Small business / single admin environments​

  • Install the January/February 2026 cumulative updates (confirm SSU prerequisite).
  • Reboot, verify Secure Boot is On in System Information, and run Confirm‑SecureBootUEFI.
  • Update firmware for any device where the vendor has published a UEFI update that mentions the 2023 CA family.
  • Back up BitLocker keys and test recovery.

Enterprise fleets (managed)​

  • Treat the effort as an operations project: inventory, pilot, firmware coordination, staged deployment and telemetry monitoring.
  • Use normal change control: small pilot ring → broad pilot ring → production rings with rollback/mitigation plans.
  • Maintain a triage list for outlier devices (air‑gapped, vendor‑unsupported, special‑purpose) and plan either isolation or scheduled hardware replacement.

Embedded / industrial / air‑gapped systems​

  • Inventory systems and identify the mechanism for enrolling certs (firmware update or manual signing workflow).
  • Coordinate with OEMs for offline firmware packages or vendor‑approved procedures to inject the 2023 CA family.
  • If vendor support is unavailable, plan compensating controls (network isolation, replace hardware, or tighten physical controls until a remediation path is available).
Each of these patterns should be executed with a standard change window, tested recovery steps and clear communication to stakeholders.

Assessment: strengths of Microsoft’s approach and remaining weaknesses​

What Microsoft did well
  • Proactive timing: moving before the June/October 2026 expirations removes a calendar‑driven risk window and preserves the platform’s ability to receive future mitigations.
  • Conservative rollout: telemetry gating and ordered certificate enrollment reduce systemic risk of a large‑scale fail‑forward event.
  • Coordination with OEMs: combining OS‑side enrollment with vendor firmware updates acknowledges real firmware diversity and provides vendor remediation paths where needed.
Where risk remains
  • Heterogeneous firmware landscape: firmware diversity means manual work for some fleet segments; not every vendor will have an immediate path for all devices.
  • Operational burden for legacy systems: organizations that have postponed migrations or maintain hardware with legacy peripheral dependencies will experience friction and possible breakage.
  • Unsupported OS coverage gaps: Windows 10 machines not on ESU will not be covered by Microsoft’s enrollment, potentially leaving important devices in a degraded state unless administrators take action.
On balance, the benefits of preserving Secure Boot’s forward‑looking capability far outweigh the operational headaches — provided organizations follow the inventory, pilot and firmware coordination guidance above.

Final recommendations — prioritized, actionable steps​

  • Immediately: ensure update infrastructure is healthy and SSUs are applied to pilot systems. Back up BitLocker keys.
  • Within 30 days: complete a hardware inventory and identify devices on unsupported OS builds, air‑gapped endpoints, and those that may require firmware updates. Create a remediation plan and schedule vendor firmware updates.
  • Prior to June 2026: ensure critical and internet‑exposed endpoints have either enrolled the 2023 CA family or are scheduled for firmware remediation; treat unsupported Windows 10 systems as high priority for platform refresh or isolation.
  • Continuously: monitor deployment telemetry, Windows event logs for Secure Boot enrollment events, and vendor advisories for new firmware releases or known issues. Keep an eye on security community reports for any emerging boot‑time exploitation attempts and treat claims of “no evidence of exploitation” as time‑sensitive.

The migration of Secure Boot’s root of trust is a foundational, preventive step — not a dramatic emergency — but it requires the same disciplined change management that any firmware‑level or cryptographic lifecycle operation demands. For defenders, this refresh preserves the platform’s ability to receive future pre‑OS mitigations and to keep boot integrity protections current. For operations teams, it is a concrete reminder that firmware‑level security is now an active, managed part of the modern patching lifecycle. Act now to inventory, pilot, and coordinate firmware updates so that your devices remain both bootable and truly secure as the 2011 era certificates reach their scheduled expiry in mid‑ to late‑2026.

Source: Petri IT Knowledgebase Microsoft Refreshes Secure Boot Root of Trust Certificates
 

Microsoft’s warning that the Secure Boot certificates issued during the Windows 8 era are being retired in 2026 is not a hypothetical maintenance note—it’s a scheduled refresh of the cryptographic trust anchors that run before Windows even starts, and it has meaningful operational and security consequences for consumers, enterprises, and anyone who manages firmware or recovery media.

A glowing Secure Boot shield protects a motherboard with trusted certificate icons.Background / Overview​

Secure Boot is a UEFI firmware feature that enforces a cryptographic chain of trust for the pre‑OS environment. Firmware holds a small set of trusted certificates and key stores—commonly referenced as PK (Platform Key), KEK (Key Exchange Key), DB (allowed signatures), and DBX (revoked signatures)—and uses them to verify the digital signatures of bootloaders, option ROMs, recovery images, and the Windows Boot Manager. If that trust anchor is outdated or exhausted, the platform loses the ability to accept new signed pre‑boot components or to receive revocations for compromised elements.
Microsoft and OEM partners originally provisioned a family of Microsoft certificates in 2011 to support Secure Boot across millions of Windows PCs. Those 2011 certificates were issued with finite lifetimes and are scheduled to begin expiring in mid‑2026 (with related expirations stretching into October 2026). To preserve the Secure Boot update path, Microsoft created a replacement family of 2023 certificates (for example, Microsoft Corporation KEK 2K CA 2023, Windows UEFI CA 2023, Microsoft UEFI CA 2023, and Microsoft Option ROM UEFI CA 2023) and began coordinated deployments in 2024–2026.
This change has been described internally at Microsoft as a “generational refresh” of the trust infrastructure. The company’s guidance is explicit: devices must receive the new 2023 certificate family before the 2011 certificates expire if they are to continue getting boot‑level mitigations, revocation updates, and future boot manager fixes. For most modern, update‑friendly systems the migration should be automatic; for older, offline, or OEM‑unsupported devices it may require manual intervention, firmware updates, or administrative remediation.

What exactly is expiring — and why it matters​

The certificates and their roles​

The three Microsoft certificates originally distributed in firmware perform distinct roles:
  • Microsoft Corporation KEK CA 2011 — stored in the KEK, authorizes updates to DB and DBX (expires beginning June 2026).
  • Microsoft Windows Production PCA 2011 — stored in DB, used to sign the Windows Boot Manager (expires by October 2026).
  • Microsoft Corporation UEFI CA 2011 — stored in DB, used to sign third‑party bootloaders and EFI applications (expires beginning June 2026).
Microsoft’s 2023 replacements split responsibilities more granularly (for example, separating option ROM signing from bootloader signing), which reduces blast radius and gives platform owners finer control over which pre‑OS artifacts they trust. That design decision helps administrators avoid over‑trusting third‑party code while still allowing legitimate option ROMs to function when required.

The practical security impact​

An expired 2011 CA does not mean PCs will “brick” overnight. Rather, affected devices enter what Microsoft terms a degraded security state: they continue to boot and run existing software, but they cannot accept new boot‑level protections signed under the old trust chain. Concretely, that means:
  • No future DBX revocation updates or DB entries signed under the retiring CA will be accepted.
  • New Windows Boot Manager or WinRE updates that require the 2023 signing chain may fail to be applied or trusted.
  • Newly signed third‑party pre‑OS components (e.g., updated shim or GRUB binaries for Linux, firmware option ROMs) may fail to load on systems that do not have the 2023 certificates.
  • Over time, the inability to apply boot‑level mitigations will leave devices vulnerable to newly discovered bootkits or pre‑OS exploitation vectors.
Security researchers and enterprise consultants have emphasized the patchability angle: OS‑level patches cannot fully protect a device against firmware or bootloader vulnerabilities if the platform can no longer accept the cryptographic updates that block or revoke compromised boot components. The result is an accumulating compliance and risk gap for systems that remain on the 2011 trust anchors.

How Microsoft and OEMs are delivering the 2023 certificates​

Microsoft’s deployment model blends OS‑assisted enrollment, phased rollouts, and OEM firmware updates:
  • OS‑side enrollment via Windows servicing: Microsoft packaged the enrollment logic (and the certificate payload metadata) into cumulative and servicing updates and implemented telemetry‑gated staged rollouts so only devices that signal firmware readiness receive automatic enrollment. This reduces risk of widespread regressions while the ecosystem sequences firmware updates.
  • Firmware/BIOS updates from OEMs: Major OEMs (Dell, HP, Lenovo and others) have been shipping 2023 certificates preinstalled on new systems and publishing firmware updates that add the 2023 family to the firmware defaults (the dbdefault store). OEM guidance typically lists affected models and required minimum BIOS versions. Where firmware refuses to accept KEK or DB writes, OEM firmware updates are the recommended path.
  • Controlled Feature Rollout assists: Microsoft introduced two OS enrollment assists (one controlled feature rollout that may require diagnostic data; one automatic deployment assist that does not require diagnostic data), and uses scheduled tasks and registry/servicing hooks to trigger the Secure Boot update operations safely. Administrators can also opt to deploy the update sequence manually in managed environments.
Microsoft also published step‑by‑step recovery guidance and Safe OS/WinRE updates to make sure recovery images can handle the new certificate set; updates such as the recent Safe OS dynamic update (for example, the January 29, 2026 Safe OS package KB5074111) include WinRE fixes and notes about Secure Boot certificate readiness. Administrators should apply these Safe OS and WinRE updates to avoid recovery or WinPE boot failures after the transition.

Who is most at risk — and why​

Not all devices are equally affected. The highest‑risk groups include:
  • PCs stuck on unsupported or out‑of‑service OS versions without Microsoft‑managed updates.
  • Machines with Secure Boot explicitly disabled (they won’t accept DB updates while disabled).
  • Air‑gapped servers, isolated VMs, or devices with restrictive update policies where OS‑side enrollment cannot run.
  • Enterprise fleets that manage KEK/DB manually or use custom signing chains for virtualization, disk encryption, or compliance‑oriented boot chains.
  • Older consumer laptops and desktops that OEMs no longer support with firmware updates.
Large vendors have published per‑model guidance and lists of unsupported platforms. For example, HP’s advisory notes platforms released in 2017 and earlier will not receive BIOS updates for this change, and Dell has been adding the 2023 certificate to supported platforms throughout 2024–2025 while recommending BIOS updating for in‑field devices. Lenovo has also published detailed implementation guidance for updating Boot Manager and WinPE images to the Windows UEFI CA 2023. If you run older hardware without firmware updates available, you may face manual remediation or limited long‑term boot‑chain security.

The Linux and cross‑platform angle​

This is not a Windows‑only story. Many Linux distributions rely on a Microsoft‑signed shim to maintain Secure Boot compatibility with a wide range of firmware: when Microsoft’s signing PCA (or UEFI CA) changes, distributions must re‑sign their shim/boot components using the new 2023 certificate and coordinate testing with OEM firmware. Red Hat and other distro vendors have published guidance noting that existing systems will continue to boot, but updates to shim or bootloader binaries signed with the 2011 key will require the 2023 CA if the 2011 CA has been revoked or added to DBX. Red Hat and others are rolling updated shims signed by the new certificate for supported releases.
Enterprise Linux admins should therefore treat Secure Boot certificate readiness as a cross‑stack task: confirm enrolled firmware keys, update shims where necessary, validate WinPE/WinRE compatibility for dual‑boot or rescue media, and coordinate with vendors for any required OEM firmware updates.

How to check your PC — a practical checklist​

Microsoft and OEMs provide direct checks you can run today. These are the standard techniques for administrators and power users.
  • Verify Secure Boot is enabled in UEFI firmware (BIOS). Systems with Secure Boot disabled will not accept DB updates.
  • In an elevated PowerShell session, check the active DB for the 2023 CA:
    ([System.Text.Encoding]::ASCII.GetString((Get-SecureBootUEFI db).bytes) -match 'Windows UEFI CA 2023').
    If this returns True, the active DB already contains the new Windows UEFI CA 2023 certificate.
  • To check whether the new certificates are present in the firmware defaults (dbdefault):
    ([System.Text.Encoding]::ASCII.GetString((Get-SecureBootUEFI dbdefault).bytes) -match 'Windows UEFI CA 2023').
    If True, the updated certificate family is built into your BIOS/UEFI defaults and will survive firmware resets or key reinstalls.
  • Look for Microsoft servicing/WinRE events and KBs on your device (for example, verify WinRE versioning after installing Safe OS dynamic updates such as KB5074111). Safe OS/WinRE readiness helps ensure recovery images accept the 2023 trust anchors.
  • Consult OEM advisories for model‑specific BIOS minimum versions and steps; vendors often publish a list of affected platforms and the minimum BIOS that includes the 2023 certificate set. If your model is unsupported, plan for remediation or hardware replacement.
If you use scripted fleet checks, Microsoft and OEMs have published PowerShell snippets and UEFI‑tool recommendations to report 2023 CA presence across an estate; these are invaluable when validating hundreds or thousands of endpoints.

Recommended actions — consumer and admin playbooks​

For consumers and small businesses​

  • Keep Windows Update enabled and install all cumulative updates. Most modern consumer devices will receive the 2023 certificates automatically via Microsoft‑managed updates.
  • Install OEM firmware updates when available—check your PC maker’s support site for BIOS/UEFI packages that reference the 2023 certificates.
  • Verify Secure Boot is enabled and run the PowerShell checks above. If you use BitLocker, back up your BitLocker recovery key before modifying firmware or Secure Boot keys—resetting keys can trigger BitLocker recovery.

For IT administrators and fleet owners​

  • Inventory: Identify devices that are running supported Windows versions, devices enrolled in ESU (if applicable), and those with firmware update paths. Use the PowerShell checks and vendor‑provided tooling to map 2023 CA status across the estate.
  • Pilot: Launch a pilot cohort to validate WinRE, imaging, virtualization, and any custom boot chains (e.g., third‑party hypervisors or custom signed shim binaries). Test recovery media and WinPE images to ensure they boot after the enrollment sequence.
  • Sequence firmware updates: Prioritize firmware updates for devices that do not contain the 2023 CA in dbdefault. For air‑gapped or restricted systems, coordinate OEM processes or plan manual enrollment workflows.
  • Update recovery and imaging artifacts: Recreate WinPE/WinRE images and recovery media using updated Boot Manager binaries signed by the 2023 CA so that recovery scenarios continue to work post‑transition.
  • Document and communicate: Provide end‑user guidance about BitLocker recovery keys and potential short reboots. Track event IDs associated with Secure Boot updates (for example Event IDs surfaced by Microsoft’s Secure‑Boot‑Update task).

Risks, limitations, and gotchas​

  • NVRAM capacity and fragmentation: UEFI stores DB/DBX/KEK data in firmware NVRAM. Older firmware implementations with limited NVRAM capacity or fragmentation can fail to accept new entries without a key reset or BIOS update. Resetting keys or writing new defaults must be done carefully in BitLocker‑protected devices.
  • Firmware bugs and vendor variance: Not all OEM firmware implements UEFI variable writes identically. Microsoft’s phased rollout relies on telemetry and firmware readiness signals precisely because some platforms can behave unpredictably when KEK/DB writes are attempted. Track vendor advisories for model‑specific caveats.
  • BitLocker recovery: Resetting Secure Boot keys or performing certain firmware operations can trigger BitLocker recovery. Administrators must ensure recovery keys are backed up and accessible prior to remediation. A misstep during mass remediation can generate large‑scale help‑desk activity.
  • Air‑gapped and telemetry‑restricted devices: Devices that cannot receive Microsoft‑managed updates automatically (e.g., air‑gapped infrastructure, some classified environments, devices with telemetry disabled by policy) require manual remediation plans. Microsoft and OEMs provide procedures, but they require careful testing.
  • Distribution and gaming anti‑cheat: Some anti‑tamper or anti‑cheat systems interact with Secure Boot and early boot components. Admins in gaming or specialized regulated environments should test those systems under the new certificate set to avoid unexpected failures.
  • Discrepant day‑level dates across vendors: Microsoft’s primary guidance uses month windows—beginning June 2026 and by October 2026—while some OEMs and third parties have published specific day estimates (for example, vendor support pages list dates in late June for some certificates). These per‑vendor day values can differ slightly; treat Microsoft’s guidance as the authoritative schedule for enforcement windows and consult your OEM for the exact date they advise for your model. Where vendors list exact days, treat those as vendor‑specific operational dates and verify against Microsoft statements before acting.
If you spot conflicting exact dates in the wild, don’t assume the earliest one is the final enforcement date—use absolute calendar checks against Microsoft KBs and vendor advisories when scheduling mass remediation.

Why Microsoft’s approach makes technical sense — and where the risk remains​

From a security‑architecture viewpoint, rotating long‑lived CA keys is the correct approach. Cryptographic best practices call for bounded certificate lifetimes, and modern attack techniques against firmware and boot components have made the ability to revoke and re‑anchor trust more important than ever. Microsoft’s split of UEFI CA responsibilities in 2023 (separating bootloader signing from option ROM signing) is an example of least privilege applied at the boot chain level: it reduces implicit trust inflation and gives platform owners more precise control.
However, the practical success of the transition depends less on cryptographic correctness and more on operational coordination. Firmware ecosystems are fragmented; OEM support windows vary; and recovery tooling must be updated in step. The biggest real‑world risks are therefore procedural: insufficient inventory, delayed firmware updates, untested recovery media, and failure to account for BitLocker and custom signing workflows. These are solvable, but they require planning and timely execution.

A realistic timeline and final checklist​

  • Now through mid‑2026: inventory, pilot, and apply firmware updates where available. Recreate recovery media (WinPE/WinRE) and validate BitLocker key backups. Confirm 2023 CA presence in db and dbdefault across a representative device set.
  • June 2026 → October 2026: the Microsoft 2011 CA family will begin expiring in June with final expirations stretching into October. Devices that have not been migrated risk losing the ability to accept future DB/DBX and bootloader trust updates. Enforcement windows and revocation steps may be phased; consult Microsoft KB articles and OEM advisories for exact operational milestones.
  • After October 2026: systems that missed the transition may still operate but will be progressively isolated from new boot‑level mitigations and may face compatibility problems with new OS/firmware features.
Final short checklist (do these now):
  • Run the PowerShell checks for the Windows UEFI CA 2023 in both the active DB and the DB default.
  • Ensure Windows cumulative and Safe OS updates (for WinRE and recovery) are applied—verify KB5074111 and related servicing updates where applicable.
  • Apply vendor BIOS/UEFI updates that include the 2023 certificate family when available.
  • Back up BitLocker recovery keys and confirm recovery workflows before touching firmware or Secure Boot keys.
  • Update and test recovery images, WinPE, and any third‑party boot components (for Linux or custom boot chains).

Conclusion​

This 2026 Secure Boot certificate rotation is one of those infrastructural maintenance events that’s invisible when handled correctly and painfully visible when neglected. Microsoft’s plan—creating a modern 2023 CA family, splitting responsibilities to reduce trust surface, and coordinating OS‑assisted and firmware‑level updates—is technically sound. The remaining work is logistical: inventory your estate, pilot changes early, update recovery tooling, and coordinate with OEMs.
For most consumers who keep Windows Update on and apply OEM firmware updates, the transition will be seamless. For administrators and owners of older, air‑gapped, or firmware‑restricted systems, the clock is real. Treat the next few months as maintenance season: test, update, and document your boot chain so you do not trade the convenience of “it still boots” for the long‑term cost of a frozen, unpatchable boot stack.


Source: LinkedIn Microsoft Issues 2026 Secure Boot Warning — What This Means For Windows Security
 

Blue neon circuit board with a glowing certificate shield and PKI blocks labeled PK, KEK, DB.
Microsoft has quietly begun a phased rollout that updates the digital certificates used by Secure Boot on Windows devices — a preemptive, ecosystem-wide refresh meant to prevent an impending expiration of long-lived 2011-era certificates and to preserve the integrity of boot‑time protections going forward.

Background​

Secure Boot is a UEFI firmware standard that prevents unsigned or tampered code from loading during the earliest stages of system startup. It is one of the foundational protections that helps stop rootkits, bootkits, and other firmware‑level attacks that bypass operating‑system defenses. Secure Boot relies on a chain of trust implemented with digital certificates and keys stored in the platform firmware (and, where applicable, augmented by the OS-maintained databases).
Microsoft and hardware partners originally deployed a set of Secure Boot certificates and signing authorities around 2011. Those certificates were always finite in lifespan, and the original Microsoft certificates are scheduled to begin expiring in mid‑2026. To avoid a window where devices would either be unable to receive future boot‑level fixes or would fall into a degraded trust state, Microsoft has prepared a 2023 certificate set and is delivering it to eligible devices now via Windows Update and coordinated OEM firmware updates.
This is not a feature update or an optional security toggle — it is maintenance of the trust infrastructure that Secure Boot depends on. Because Secure Boot sits below the operating system, the consequences of expired or missing certificates would be felt down the stack: fewer future boot protector updates, potentially incompatible signing requirements for new boot software, and increased risk from attacks targeting the early boot environment.

What Microsoft is changing and why it matters​

Microsoft’s initiative replaces or supplements the following older certificate authorities and certificate entries with newer ones issued in 2023:
  • The Microsoft KEK CA (Key Exchange Key) formerly issued in 2011 is being refreshed to a 2023 KEK certificate to maintain trusted update signing for Secure Boot databases.
  • The signing authority used for Windows bootloader binaries (the production PCA used to sign Windows Boot Manager) is updated so that future boot manager updates and revocations can be validated.
  • The UEFI CA entries used for option ROMs and third‑party EFI applications are being split and replaced to allow finer-grained trust control (separating option ROM signing from third‑party bootloader signing).
Why this matters:
  • Sustained security: New certificates keep the Secure Boot trust chain valid so Microsoft and OEMs can continue to patch boot‑level vulnerabilities.
  • Compatibility: Boot loaders, OS components, and firmware updates that require modern trust anchors will continue to validate properly.
  • Avoiding a degraded state: Devices that remain on the old 2011 certificates beyond their expiry will not immediately stop booting, but they will no longer receive new Secure Boot protections — effectively placing them into a progressively weaker security posture.

How the rollout works (high level)​

Microsoft is using multiple mechanisms to deliver the new certificates, depending on device type and management state:
  • For most consumer and managed Windows 11 devices, Microsoft is delivering the certificate updates through Windows Update as part of cumulative updates and controlled feature rollouts. The delivery is phased to reduce risk and to catch firmware edge cases before broad deployment.
  • For Windows 10 devices, eligibility is limited to supported editions and those enrolled in Microsoft’s Extended Security Updates (ESU) where applicable; older, unsupported Windows 10 installations will not automatically receive the assistive update.
  • For enterprise environments, Microsoft provides guidance and tooling for administrators to push certificate updates using standard deployment pipelines, Configuration Manager, or Intune policies. Microsoft’s guidance emphasizes that organizations remain responsible for ensuring firmware and boot databases are updated across their fleets.
  • On some hardware, an additional UEFI firmware update from the OEM may be required to apply and persist the certificate changes in platform firmware.
Key operational points Microsoft and partners have stressed:
  • In most consumer cases, no user action is required; updates are designed to install silently when Windows Update is active.
  • The rollout is phased, with diagnostics and telemetry used to control confidence-based deployment and avoid mass‑impact of unforeseen firmware interactions.
  • Some specialized systems (servers, embedded devices, ISV‑specific hardware) may require manual intervention or vendor firmware updates.

The technical plumbing: PK, KEK, DB, and DBX explained​

To understand the potential impacts and necessary steps, it helps to briefly review the Secure Boot components:
  • PK (Platform Key): Controlled by the OEM (or firmware owner), it is the root of trust on a specific device. PK changes are not part of Microsoft’s certificate refresh; PK remains the platform owner’s trust anchor.
  • KEK (Key Exchange Key): Used to authorize updates to the Secure Boot databases (DB and DBX). The KEK CA entry allows signing of database updates so the firmware will accept new entries.
  • DB (Signature Database): Contains trusted signing certificates and hashes for bootloaders, option ROMs, and other EFI applications that are allowed to run.
  • DBX (Revoked Signature Database): Contains revoked certificates and known‑bad signatures that the firmware must block.
Microsoft’s update replaces or adds modern KEK and DB entries so that:
  • Future DB and DBX changes can be applied and validated.
  • Windows Boot Manager updates and revocations continue to work.
  • Option ROM and third‑party signing can be handled with more granular trust separation.
The practical effect is to keep the mechanism for signing and revoking boot components functional beyond the expiration of original 2011 certificates.

Who will (and won’t) receive the update​

Affected devices:
  • Most Windows 11 PCs with Secure Boot enabled and receiving Windows cumulative updates.
  • Supported Windows 10 systems that remain under Microsoft update coverage (including ESU customers where applicable).
  • Enterprise and managed devices — when administrators allow and coordinate the update through Microsoft guidance or management tools.
Devices that may not receive automated updates and will need additional steps:
  • Devices with Secure Boot disabled in firmware (they do not receive the Secure Boot certificate changes).
  • Older or out‑of‑support hardware that no longer receives firmware updates from OEMs.
  • Specialized server, embedded, or IoT systems where OEM firmware or modified Secure Boot databases are used; these may require vendor intervention.
  • Systems behind network firewalls or with telemetry/diagnostic data blocked, where Microsoft’s managed delivery pathways cannot verify or perform the update.
Important nuance: Even devices that do not receive the new certificates will typically continue to boot and run. The immediate functional disruption is unlikely. The real impact is the loss of future boot‑level security updates and the increasing risk that new boot‑time mitigations will not be applied to those systems.

Practical impacts and user scenarios​

What most users will experience:
  • For the majority of consumer Windows 11 users, the update will install quietly with no visible change.
  • Occasional prompts for a reboot may appear after the cumulative update has applied.
  • In rare cases, a firmware update from an OEM may prompt BitLocker recovery at the next boot — this is a side‑effect when firmware or boot components are changed and is expected behavior; keeping your BitLocker recovery key handy is prudent.
What sysadmins and advanced users should watch for:
  • Dual‑boot systems (Linux + Windows) that rely on custom bootloaders like GRUB: most modern Linux distributions ship shim and grub binaries signed by recognized authorities; however, there are edge cases where custom or older boot components might require re‑signing or an update.
  • Custom Secure Boot setups: Enterprises with custom Secure Boot keys or locked down PK/DB configurations need to validate their processes and may require manual KEK or DB updates.
  • Servers and specialized appliances: Some server platforms have vendor‑specific UEFI implementations that need firmware updates before the 2023 certificates can be stored in the platform firmware. Administrators should coordinate with OEMs and have maintenance windows planned.
  • Devices with Secure Boot disabled: These devices will not receive the certificates and remain statically less protected; enabling Secure Boot and ensuring firmware compatibility is the recommended path.

Step‑by‑step checklist: what Windows users and admins should do now​

  1. Confirm whether Secure Boot is enabled on your device (system firmware/UEFI settings). If disabled, evaluate why and whether it can be safely re-enabled.
  2. Keep Windows Update enabled and allow cumulative updates to install. Microsoft’s 2023 certificate assist is delivered through recent LCUs and phased updates.
  3. For BitLocker users: back up your BitLocker recovery key before applying firmware updates or allowing major boot updates. Expect that some firmware changes can trigger recovery prompts.
  4. Check OEM support: review your PC or server vendor guidance for firmware updates that may be necessary to complete or persist certificate changes in platform firmware.
  5. For Linux/dual‑boot users: ensure you run current distro releases or update shim/grub packages so signed boot components remain trusted after the certificate refresh.
  6. Enterprise admins: inventory devices, identify any unmanaged or specialized hardware, and prepare update plans. Use Microsoft’s guidance and tooling (Intune, Configuration Manager, controlled rollouts).
  7. If your organization blocks diagnostic telemetry, coordinate with Microsoft or OEMs because some managed updates depend on diagnostic signals to orchestrate safe rollouts.

Strengths of Microsoft’s approach​

  • Proactive timing: Microsoft is updating certificates well ahead of the 2026 expiry window, reducing the risk of last‑minute scrambling and compatibility regressions.
  • Phased deployment: Controlled rollouts and confidence-based deployment reduce the chance of mass disruptions from firmware idiosyncrasies.
  • Ecosystem coordination: Microsoft is working with OEMs, firmware vendors, and enterprise management tooling to cover the many permutations of Windows devices in the field.
  • Technical refinement: Splitting option ROM and bootloader signing authorities gives OEMs and administrators more control over what is trusted, reducing blast radius for third‑party firmware issues.

Risks, downsides, and unresolved caveats​

  • Dependency on OEM firmware support: Some devices require a firmware update to persist certificate changes in platform NVRAM. Older, unsupported devices may never receive such firmware, leaving them behind.
  • Windows 10 limitations: Devices still running Windows 10 but outside Microsoft’s support windows will not get managed assists; the ESU program covers some customers, but this is a paid option and not universal.
  • Operational complexity for enterprises: Large fleets with custom PK/DB policies, regulated hardware, or isolated networks will need careful testing and staged deployments to avoid unexpected BitLocker recoveries or boot issues.
  • Privacy/diagnostic tradeoffs: Microsoft’s managed delivery pathways sometimes require diagnostic telemetry; organizations that block such telemetry may need to apply updates manually, increasing administrative overhead.
  • Edge cases remain: Custom bootloaders, unsigned option ROMs, and heavily modified UEFI implementations can still cause problems — these are often the hardest to find and fix at scale.

Common questions and clarifications​

  • Will my PC stop working if the old certificates expire?
    No. Expiration does not instantaneously prevent a device from booting. The immediate effect is functional continuity, but the device will no longer be eligible to receive future boot‑level security updates or boot manager mitigations that require the updated trust anchors.
  • Is this an optional update I can skip?
    For consumer devices, you should not skip it. The update is part of maintaining the boot trust chain. For managed environments, administrators should plan to deploy it in a controlled manner.
  • Can I just disable Secure Boot to avoid problems?
    Disabling Secure Boot is not a safe workaround. Doing so removes the protection entirely and increases exposure to firmware‑level threats as well as breaking assumptions for some security features (e.g., BitLocker hardening).
  • Will dual‑boot Linux systems break?
    Most modern Linux distributions use shim/grub binaries that are signed and trusted; however, older or custom boot configurations can run into trust issues. Dual‑boot users should update their distribution’s boot packages and test on a non‑critical machine first.

Recommended test and mitigation plan for IT teams​

  1. Identify a pilot set of devices representing the diversity of your fleet: consumer laptops, corporate SKUs, servers, and any specialized appliances.
  2. Verify Secure Boot state and BitLocker policy on each pilot device.
  3. Apply the cumulative update containing the certificate changes in a lab environment and reboot to observe behavior. Record whether BitLocker prompts for recovery.
  4. Confirm firmware versions and coordinate with OEMs for any vendor‑required BIOS/UEFI updates.
  5. Validate dual‑boot and third‑party option ROM compatibility on pilot devices.
  6. If pilot is successful, stage the rollout using your usual change window processes and monitoring tools.
  7. Maintain communication channels for rapid rollback or remediation in case of unexpected outcomes.

Broader security and ecosystem implications​

This certificate refresh is more than housekeeping. It is an example of how long‑lived cryptographic assets in firmware must be managed across an incredibly diverse hardware ecosystem. Certificates and signing authorities are foundational to how machines establish trust before any operating system protections take hold. Without timely maintenance and coordinated vendor efforts, operating systems become unable to enforce or receive mitigations for the most privileged categories of attack.
The exercise also highlights practical realities for platform security:
  • Cryptographic lifecycles must be planned years in advance for hardware platforms.
  • Vendor and OEM cooperation is essential; operating system vendors cannot unilaterally fix firmware that is physically stored in OEM NVRAM.
  • Enterprises require robust change management because even non‑disruptive security maintenance can interact with encryption and custom firmware.

Final analysis: quiet maintenance, high stakes​

Updating Secure Boot certificates is not flashy, but it is high‑impact. Microsoft’s phased, proactive approach reduces the chance of a support crisis later in 2026, and the technical changes (including separate signing authorities for option ROMs) provide better operational control. For most consumer devices the rollout will be invisible — and that’s the point: security maintenance should not be disruptive.
The principal weaknesses are not in Microsoft’s planning but in the heterogeneity of the hardware ecosystem and the reality that some devices simply will not receive the necessary firmware updates. Organizations and end users who delay, operate unsupported hardware, or disable Secure Boot may face increasing risk as future kernel and boot mitigations depend on updated trust anchors.
The practical advice is simple and urgent: keep Windows Update enabled, back up BitLocker recovery keys, coordinate with your OEM for firmware updates, and for administrators, test and stage the rollout across representative hardware. This is maintenance that preserves the integrity of the entire boot chain; doing nothing is a risk that compounds every month after the 2011 certificates expire.
In short: the update is quiet, but it matters. Ensure your devices — personal or managed — receive the 2023 certificate updates and any required firmware revisions so Secure Boot continues to defend the earliest and most critical stage of system security.

Source: thewincentral.com Microsoft Refreshes Secure Boot Certificates on Windows
 

Glowing Secure Boot shield on a motherboard, with BIOS/UEFI and Windows Boot Manager nearby.
Microsoft will begin delivering a coordinated refresh of Secure Boot certificates through Windows Update in March 2026, a multi‑stage effort designed to replace the aging 2011 trust anchors before they begin expiring in mid‑2026 and to preserve pre‑boot security and updateability across millions of Windows PCs.

Background​

Secure Boot is a UEFI firmware feature that enforces a small, firmware‑anchored chain of trust at system start‑up. It validates signatures on bootloaders, option ROMs and early boot binaries so that unsigned or tampered code cannot execute before the operating system initializes. For most Windows PCs shipped since 2011, Microsoft‑issued certificates were placed into the firmware Secure Boot databases (DB/KEK/PK), and those certificates have formed the backbone of Windows’ pre‑OS security model for more than a decade.
The problem is lifecycle: certificate authorities issue credentials with finite lifetimes by design, to reduce the risk window if keys are ever compromised. The original Microsoft certificates issued in 2011 are scheduled to begin expiring in June 2026 (with a final Windows boot‑signing PCA expiring later in October 2026). If devices still depend on those 2011 trust anchors when they lapse, they will no longer be able to validate newly signed boot components or accept Secure Boot updates — a practical breakdown in the platform’s ability to receive and trust pre‑OS patches.
Microsoft and OEM partners prepared a replacement family of certificates issued in 2023 (the “CA 2023” family) and built an OS‑side, phased servicing flow that injects the new certificates into firmware variables and then hands off trust to a newly signed Windows Boot Manager. That automation is being shipped as part of normal Windows quality updates so the transition can scale across the diverse Windows install base.

What’s changing: the technical picture​

The certificates involved​

Three long‑running Microsoft CAs issued in 2011 are the primary anchors reaching end of life:
  • Microsoft Corporation KEK CA 2011
  • Microsoft UEFI CA 2011
  • Microsoft Windows Production PCA 2011
Microsoft’s replacement set (the CA 2023 family) includes at least four new entries:
  • Microsoft Corporation KEK 2K CA 2023
  • Microsoft UEFI CA 2023
  • Microsoft Option ROM UEFI CA 2023
  • Windows UEFI CA 2023
Replacing the KEK, UEFI CA and Windows PCA in a controlled order preserves the full boot verification chain — from third‑party option ROMs and shim loaders to the Windows Boot Manager itself.

How the OS‑side rollout works​

Microsoft’s servicing flow is deliberately order‑sensitive. The high‑level sequence deployed by the servicing task on endpoints is:
  • Add the Windows UEFI CA 2023 to DB.
  • If the legacy Microsoft UEFI CA 2011 exists, add Microsoft UEFI CA 2023 and Microsoft Option ROM UEFI CA 2023 to DB.
  • Add Microsoft Corporation KEK 2K CA 2023 to KEK (this step may require OEM‑signed KEK material).
  • Replace the Windows boot manager binary with a version signed under the new 2023 PCA; a restart completes this trust hand‑off.
That sequence prevents replacing the boot manager before the firmware trusts its new signer and avoids orphaning a device mid‑transition. The logic and device‑targeting metadata that enables this flow were included in January and February cumulative updates as the staging mechanism for the automated rollout.

Which update packages to watch​

Microsoft began embedding the delivery logic in January cumulative updates (packages published January 13, 2026) and followed with a February cumulative (for example, KB5075941 on February 10, 2026) that formalized the Boot Manager replacement and broader telemetry gating used to stage devices for automatic enrollment. Administrators should note these KB IDs and their matching OS build targets when planning deployments.

The rollout plan and eligibility​

Microsoft’s approach is cautious and telemetry‑gated. The key points for timing and eligibility:
  • Automatic certificate delivery via Windows Update is phased and targeted. Devices must demonstrate “sufficient successful update signals” — a history of healthy updates — before Microsoft’s servicing flow will attempt the firmware enrollment automatically. This gating reduces the risk of large‑scale failures during a highly sensitive firmware modification.
  • The rollout is targeted to Windows 11 systems and Windows 10 devices with ESU (Extended Security Updates) coverage. Devices running unsupported versions of Windows (no ESU) will not receive these certificate updates and therefore remain outside this maintenance window.
  • Newer hardware manufactured in 2024 and later is already shipping with the 2023 certificates pre‑loaded in firmware. Many 2025 devices already include the CA 2023 family out of the box, and those devices often receive only the Boot Manager replacement step in the cumulative update flow.
  • Some devices require a firmware (UEFI/BIOS) update from the OEM before the OS can safely add KEK material. Where an OEM has not pre‑signed or permiteed the KEK operation, Windows will wait for OEM cooperation or for an administrator to apply the vendor firmware update. Dell and other OEMs have collaborated early with Microsoft to prepare device support, but hardware diversity means some vendors and models will need manual firmware steps. If you manage a mixed fleet, validate OEM firmware release notes now.

Why this matters — security and serviceability​

Secure Boot sits at the very start of the security chain. A valid, up‑to‑date set of CA certificates in firmware lets the platform:
  • Reject tampered or unsigned pre‑OS code (bootkits, early rootkits).
  • Accept future signed updates to shim, bootloaders and Windows Boot Manager.
  • Maintain compatibility with anti‑cheat systems and kernel‑level protections that depend on pre‑OS integrity checks.
If a device fails to transition before the 2011 certificates lapse, it typically will still boot, but it will enter a degraded security state: the system may not accept future Secure Boot‑related updates, and newer boot components signed under the 2023 CAs will not be trusted. That increases both security and compatibility risk — for example, anti‑cheat software could refuse to operate, or updated platform components may not load.
Boot‑level attacks are particularly dangerous because they execute before kernel defenses and can persist across OS reinstalls. Rotating the CA set before expiry is therefore an essential preventative maintenance action to limit the attack surface exposed to persistent pre‑OS malware.

Practical impacts: who feels the pain if things go wrong​

  • Enterprises with air‑gapped networks, strict telemetry policies, or high‑security control over firmware may not pass Microsoft’s health gating automatically and therefore must perform manual remediation to enroll the new CA set.
  • Virtual machines and cloud images that rely on platform Secure Boot will need special attention: virtual firmware or image templates may need updating to include the new CA entries. That work is not automatic for many hypervisors and cloud providers; administrators must validate the virtual firmware stack.
  • Multi‑boot systems (Windows alongside Linux) that rely on shim and third‑party signed bootloaders should verify that distributions and signed shim binaries will still be validated after the transition. Independent OS vendors — including major Linux distributors — have warned the 2011 key expiry affects shim trust, so cross‑OS scenarios are in scope.
  • Devices on unsupported Windows versions (no ESU) will not receive the certificate payloads and therefore face the June 2026 expiry as a firm cutoff. For those systems, the practical options are to upgrade to a supported OS or accept permanently degraded pre‑boot security.

Strengths of Microsoft’s approach​

  • Phased, telemetry‑gated deployment reduces blast radius. By only targeting devices with a reliable update history, Microsoft lowers the probability of mass failures from a firmware variable change.
  • Order‑sensitive servicing flow prevents a trust gap. The stepwise addition of CA entries before replacing the boot manager avoids orphaning a device with an untrusted boot binary.
  • Backwards compatibility options for admins. Microsoft documented manual remediation paths (Group Policy, Intune/WinCS, registry toggles) so enterprise admins can apply the same certificate changes in controlled ways when automated delivery is inappropriate.
  • Early OEM collaboration. Vendors such as Dell engaged early with Microsoft to ensure firmware cooperation where KEK updates are required, reducing friction for many modern devices. That coordination is critical in reducing heterogeneous failure modes.

Risks, unknowns and failure modes​

  • Devices that have had Secure Boot DB entries reset or toggled may encounter a Secure Boot violation after the Boot Manager replacement. Microsoft recommends creating Secure Boot recovery media as a remedy, but recovery scenarios can be disruptive for end users and administrators.
  • OEM firmware lag. Some vendors or older models may not provide the necessary signed KEK material or firmware support in time. Those devices may require manual firmware updates or remain unpatched through the expiry window. This is a significant operational risk for diverse fleets. Administrators should inventory firmware support status now.
  • Air‑gapped and telemetry‑restricted systems. The telemetry gating that prevents automatic enrollment on devices with poor update health also means many high‑security environments will not get automatic updates and must follow manual procedures. This increases administrative burden and the chance of human error.
  • Partial or failed enrollments. A failed step mid‑flow could leave devices unable to validate a new boot manager or accept updates — even if they still boot. Microsoft’s phased approach aims to reduce this, but it is not a guarantee; organizations should test extensively in staging environments.
  • Unsupported Windows installations. Machines running Windows versions past their support window (no ESU) are effectively excluded from remediation through Windows Update. That creates a hard security boundary on June 2026 and a compliance issue for organizations still operating legacy systems.

What to do now — a practical checklist for administrators and advanced users​

Follow this prioritized checklist to prepare your estate:
  • Inventory: Identify all devices running Windows 11 and Windows 10 with ESU, and flag any systems on unsupported Windows versions. Prioritize business‑critical endpoints and air‑gapped populations.
  • Confirm update health: Ensure devices have recent successful cumulative update installs and healthy Windows Update telemetry (so they qualify as “high‑confidence” for automatic enrollment).
  • Check firmware: Query OEM firmware versions and vendor release notes for KEK/UEFI CA 2023 support; schedule firmware updates for devices that need them. Dell and other OEMs have published guidance based on early collaboration.
  • Test in staging: Apply the January/February cumulative updates (which include the certificate delivery logic) in a controlled lab environment and validate boot behavior, recovery media, and multi‑boot scenarios. KB5073455, KB5073724 and KB5075941 are relevant test targets depending on OS build; match KBs to your OS.
  • Build recovery media: Create Secure Boot recovery USBs and document manual remediation steps for machines that encounter Secure Boot violations. Microsoft recommends recovery media in rare failure cases.
  • Plan manual rollout options: For air‑gapped or telemetry‑restricted systems, prepare Group Policy, Intune or WinCS configurations and the registry-based remediation steps Microsoft documented.
  • Communicate with stakeholders: Notify game studios, virtualization teams and Linux/multi‑boot users about the planned change and test anti‑cheat/bootloader compatibility where applicable.

How to verify status on an endpoint​

Microsoft provided registry flags and servicing task markers that can be inspected to determine whether an endpoint has progressed toward the CA 2023 enrollment. One commonly referenced key in documentation is UEFICA2023Status (a registry bitmask) which indicates device readiness and progression through the enrollment steps. Administrators should use monitoring tools and scripts to check these registry values and track rollout progress across their fleets.
(If you are supporting large fleets, export and centralize these checks through inventory tools or Intune reporting to produce a clear picture of how many devices remain to be enrolled.)

Special considerations: gaming, virtualization and multi‑boot scenarios​

  • Gaming and anti‑cheat: Several modern anti‑cheat systems rely on Secure Boot to establish platform integrity. A machine that cannot validate updated boot components might be refused by anti‑cheat, causing games such as those named by vendors to be unplayable until the certificate transition is complete. Test gaming endpoints early if gaming is a supported workload.
  • Virtualization: Virtual firmware (OVMF/virtual UEFI) in hypervisors may need to be updated to include the CA 2023 entries. Many cloud images and VM templates are immutable until updated by providers; coordinate with cloud and virtualization teams to ensure images are updated ahead of the CA expiry window.
  • Linux / shim: Linux distributions that use shim and a signed bootloader may be affected by the change in trust anchors. Where possible, validate shim signatures and vendor guidance; major distributors have issued guidance warning the 2011 expiry impacts shim trust.

Critical assessment and final takeaways​

Microsoft’s certificate refresh is necessary, timely and largely well‑designed: the phased, telemetry‑gated OS‑side approach combined with OEM coordination minimizes the chance of catastrophic failures while ensuring a broad switchover before the 2011 certificates age out. The work demonstrates good platform stewardship: rotating long‑lived credentials is a best‑practice in cryptographic hygiene and reduces long‑term risk.
That said, the operation is not without risk or friction. The primary pain points are firmware heterogeneity, air‑gapped or telemetry‑restricted environments, legacy unsupported OS installations, and multi‑boot or virtualization scenarios where trust is managed outside Microsoft’s Windows Update flow. Administrators should treat this refresh as a firm deadline for remediation work — the consequences of inaction are functional (possible anti‑cheat failures, inability to load new boot components) and security‑related (reduced ability to receive pre‑boot fixes).
Practical recommendations:
  • Treat March–June 2026 as a scheduled service window and perform staged validation now.
  • Inventory, patch firmware, and test recovery processes.
  • For air‑gapped or high‑security fleets, prepare manual enrollment playbooks and test them.
  • For unsupported Windows installations, plan OS upgrades or replacement before June 2026.
This certificate rotation is one of the largest coordinated pre‑boot maintenance actions in Windows history. When executed properly it will preserve Secure Boot’s protective value for years to come; when ignored it creates avoidable risk and compatibility headaches. Administrators and advanced users who prepare now will avoid the last‑minute scramble that otherwise looks inevitable as the 2011 roots approach their expiration windows.

In short: Microsoft’s CA 2023 refresh is necessary, technically sound and cautious — but not automatic for every system. Inventory, firmware updates, testing and recovery preparation are the immediate tasks that separate a smooth transition from a disruptive one.

Source: WinBuzzer Microsoft Refreshes Secure Boot Certificates via Windows Update
 

Microsoft has quietly started the work that will prevent a class of very old Secure Boot signing certificates — the ones first shipped in 2011 — from being usable after they expire between June and October 2026, and that work matters for anyone who cares about boot‑time integrity on Windows machines, whether at home, in school, or across a corporate fleet.

Neon blue Secure Boot diagram on a motherboard, linking 2011 to 2023 with KEK and DB icons.Background​

Secure Boot is a firmware‑level trust mechanism implemented through UEFI that helps ensure only trusted, signed code runs before the operating system loads. Since the early 2010s Microsoft and OEM partners have distributed a small set of Microsoft‑issued certificates into the UEFI variables on modern PCs. Those certificates (stored in the platform’s KEK and DB variables) let firmware and Windows verify that boot components like the Windows Boot Manager and associated early‑boot code are signed by trusted authorities.
Those original Microsoft certificates from 2011 were always time‑bound. Microsoft and partner OEMs produced replacement certificates in 2023 and have been rolling out a controlled, confidence‑based update process to move devices to the 2023 trust chain. The old 2011 certificates begin to expire starting in June 2026 and the transition window runs through October 2026. If a device still relies on the 2011 CAs after their expiration, it will continue to boot and run but it will no longer be able to receive new Secure Boot and boot‑manager protections signed under the new trust chain.
This article explains what the certificate refresh actually is, who will be affected, how Microsoft and OEMs are deploying the changes, how to check your devices, and what actions both personal users and IT administrators should take to avoid unexpected degradations later in 2026.

Overview: what exactly is changing​

  • The existing Microsoft Secure Boot certificates issued in 2011 are being replaced by a set of 2023 certificates that Microsoft published in collaboration with OEMs.
  • The change affects the certificates stored in two UEFI variables: the Key Exchange Key (KEK) and the Allowed Signature Database (DB). The revocation list (DBX) mechanism continues to be managed as before.
  • Once the 2011 certificates expire, Windows cannot accept updates to the Secure Boot databases that were signed by the expired CAs. That prevents newly‑signed boot‑time protections or updates to the revocation lists from being applied to affected devices.
  • Microsoft’s rollout is confidence‑based: Windows Update includes the new certificate payloads, but additional logic and OEM firmware readiness checks determine whether a given device will actually apply them. That reduces risk but also means updates can appear gradual or paused for certain hardware.
Why this matters: Secure Boot certificates are the foundation for maintaining protections in the pre‑OS environment. When that foundation ages out, future mitigations for boot‑level exploits (including those like known UEFI bootkits) cannot be applied to devices that did not receive the new CAs.

Which certificates are changing (technical summary)​

For clarity, the key certificates involved are:
  • Microsoft Corporation KEK CA 2011 — stored in the KEK; used to sign updates to DB and DBX. (Replaced by Microsoft Corporation KEK 2K CA 2023.)
  • Microsoft Windows Production PCA 2011 — stored in the DB and used to sign the Windows Boot Manager. (Replaced by Windows UEFI CA 2023.)
  • Microsoft Corporation UEFI CA 2011 — stored in the DB and used for third‑party EFI binaries and option ROMs. (Replaced by Microsoft UEFI CA 2023 and Microsoft Option ROM UEFI CA 2023.)
The 2011 certificates begin expiring in June 2026 and the process extends through October 2026. Microsoft’s approach separates boot loader signing from option ROM signing in the 2023 chain, providing finer control for OEMs and security teams.

Who is affected — quick summary​

  • Most consumer Windows 11 devices and supported Windows 10 devices that get Microsoft‑managed updates will be updated automatically and should not need user action.
  • Windows 10 devices that are no longer receiving mainstream updates (after end‑of‑support) will only get the certificate servicing if they are enrolled in the Extended Security Updates (ESU) program or are on supported LTSC/ESU channels.
  • Enterprise, education, and government fleets are affected differently: administrators must coordinate firmware/OEM updates, management tooling (SCCM, Intune), and staged rollouts to avoid disruption.
  • Virtual machines and some server environments can behave differently; Hyper‑V VMs and other virtualized platforms have documented failure modes for KEK updates and may require vendor patches or special handling.
  • Devices whose firmware is no longer supported by the OEM will not receive a firmware update and may be unable to adopt the 2023 certificates — in those cases the device will be in a progressively degraded security posture after the 2011 CAs expire.
In short: for most up‑to‑date personal Windows devices you will probably be fine, but unmanaged, older, vendor‑abandoned, or specialized systems deserve attention well before June 2026.

How Microsoft and OEMs are delivering the change​

Microsoft’s update model for this transition is intentionally cautious:
  • The 2023 certificates were packaged into Windows cumulative updates and servicing payloads and began shipping prior to the expiry window.
  • Deployment uses a confidence‑based or controlled feature rollout model. Devices that present telemetry and show compatibility signals are targeted first. Microsoft monitors telemetry and OEM feedback to pause or expand the rollout as needed.
  • A scheduled task on Windows checks the device’s servicing registry values and processes available updates periodically (roughly every 12 hours). When a device is “targeted” for the update, a series of steps attempt to write the new certificates into firmware NVRAM.
  • Many systems require an OEM firmware (BIOS/UEFI) update before Windows can safely write the new certificate entries. That’s why Microsoft and OEMs strongly recommend applying any firmware updates the vendor provides first.
  • For enterprise fleets, Microsoft provides guidance, PowerShell tooling, event IDs, and deployment strategies to let administrators stage, monitor, and remediate updates across thousands of endpoints.
This approach reduces the likelihood of mass disruption from a single global push, but it also requires attention from admins to ensure all hardware types in their estate are covered.

How to check your device — practical steps​

If you’re a home user or an IT pro, use the following checklist to verify your device’s state.

Quick consumer checks (5 minutes)​

  • Confirm Secure Boot is enabled:
  • Open Windows PowerShell as Administrator and run:
  • Confirm-SecureBootUEFI
  • The command returns True if Secure Boot is on.
  • Check Windows Update and BIOS date:
  • Make sure Windows Update is set to receive Microsoft‑managed updates.
  • Open System Information (type msinfo32 in Start). Check the BIOS Date/Version — if you have a recent BIOS from your OEM, that increases the likelihood the device will accept the new certificates.
  • Look for Secure Boot update events:
  • Open Event Viewer → Windows Logs → System and filter for the Secure Boot update events:
  • Event ID 1808 (Informational) — indicates the device has updated its Secure Boot CA/keys.
  • Event ID 1801 (Error) — indicates updated certificates are available on the device but have not yet been applied to firmware.

PowerShell checks for certificate presence (advanced)​

On systems that expose the UEFI DB via PowerShell, you can check whether the new 2023 entries are present:
  • A simple one‑line check (Admin PowerShell) that looks for the Windows UEFI CA 2023 in firmware:
  • ([System.Text.Encoding]::ASCII.GetString((Get-SecureBootUEFI DB).Bytes) -match 'Windows UEFI CA 2023')
  • A similar check for the DB default:
  • ([System.Text.Encoding]::ASCII.GetString((Get-SecureBootUEFI dbDefault).Bytes) -match 'Windows UEFI CA 2023')
If the commands return True, that indicates the 2023 certificate string is present in the DB. Note that the presence of the certificate in firmware does not necessarily mean Windows has completed the full servicing cycle (which may also include enabling a 2023‑signed boot manager).

Registry and servicing status (for administrators)​

Windows writes servicing metadata under:
  • HKLM\SYSTEM\CurrentControlSet\Control\SecureBoot\Servicing
Keys to be aware of:
  • WindowsUEFICA2023Capable — shows firmware transition progress (0 = no certificate, 1 = certificate present but old boot manager active, 2 = certificate present and new boot manager active).
  • UEFICA2023Status — values like NotStarted, InProgress, Updated, or an error string.
  • AvailableUpdates — bitmask indicating pending steps.
Administrators can query those values remotely and correlate them with Event IDs to understand which devices are paused, under observation, or updated.

What to do if your device is not current​

  • Keep Secure Boot enabled — do not disable it as a workaround. Disabling Secure Boot removes the protections and is not an acceptable long‑term fix.
  • Run Windows Update until no further updates are pending. The certificate payloads are delivered as part of cumulative updates and servicing tasks.
  • Check your OEM’s support and download center for the latest BIOS/UEFI firmware and apply vendor instructions. OEM firmware updates remain the most common blocker when the Windows servicing step fails.
  • Reboot after firmware updates and check Event Viewer for Event IDs 1808 / 1801. A successful firmware + Windows servicing sequence will normally log the informational success event.
  • If you manage a fleet, coordinate staged deployments: pilot on a small group, validate success, then expand. Use Microsoft’s suggested monitoring events and servicing registry keys to track progress.
  • If Windows Update reports the certificate payload is present but the firmware cannot be updated, consult your OEM. Some older platforms will not receive firmware updates and may require hardware replacement if full Secure Boot protection is needed.

Enterprise and school IT: practical guidance​

  • Treat this like a firmware lifecycle project, not just a Windows Update. Inventory hardware, map OEM support lifecycles, and tag devices that lack vendor firmware updates.
  • For managed fleets, use management tools (ConfigMgr, Intune, Windows Autopatch) to:
  • Deploy firmware updates in a controlled manner.
  • Distribute PowerShell scripts or compliance policies that verify Secure Boot and certificate presence.
  • Monitor Event ID 1801 and 1808 to build dashboards showing rollout state and devices requiring remediation.
  • Use staged rollouts and confidence windows. Microsoft’s own rollout is confidence‑based; duplicating that approach reduces risk of wide‑scale failures.
  • Be particularly careful with virtualization hosts and images. Some Hyper‑V configuration scenarios produced event‑level errors in past testing for KEK updates; Microsoft documented mitigations and planned patches for specific VM failure modes.
  • Keep a remediation plan: devices in a “failed” state may need a manual firmware procedure to clean or reset keys, and in some rare cases a vendor’s recovery utility or a controlled BIOS reflash.

Special cases and risks — what could go wrong​

  • Firmware compatibility: writing keys into UEFI NVRAM is sensitive. If an OEM firmware implementation is buggy, an update could fail, be paused, or — in the worst but rare case — produce boot issues. That is the reason Microsoft and partners staged the rollout and require OEM firmware readiness first.
  • Virtual machines: virtualized platforms often emulate a UEFI environment and can have write protections or different behavior; KEK writes to virtual firmware can fail with errors such as “media is write protected.” Vendors released patches for some hypervisors in coordinated updates.
  • Dual‑boot and third‑party OSes: some Linux distributions and third‑party bootloaders rely on the existing signer chain. Historically, Secure Boot database changes and DBX updates have, in limited cases, made certain shims or bootloaders unbootable until rebuilds were signed with the accepted CA. If you dual‑boot, test on representative systems before broad rollout.
  • BitLocker and disk encryption: BitLocker’s posture is partly influenced by Secure Boot and boot manager integrity. Changing certificates by itself typically won’t cause immediate BitLocker failures, but systems that rely on kernel or boot manager hardening might behave differently if the firmware trust flow changes. Always ensure recovery keys are backed up before you perform firmware or policy changes.
  • Unsupported hardware: If an OEM no longer supplies firmware updates for a model, that device will not receive the new certificate chain and will be unable to accept future boot‑time security updates — replacement or decommissioning may be the only practical path for continued protection.

Troubleshooting common failure modes​

  • Windows shows the certificate payload is available but firmware isn’t updated
  • Confirm you installed the OEM firmware update first.
  • Reboot the device several times; some firmware writes require multiple reboots to commit NVRAM changes.
  • Check Event Viewer for Event ID 1795 or 1801, which provide diagnostic reasons.
  • Check the servicing registry keys and scheduled task status.
  • Device logs Event ID 1795 (KEK update fails)
  • This is commonly seen in virtual machines and can be caused by a VM host’s UEFI implementation. Apply hypervisor updates or use vendor guidance to remediate.
  • For physical machines, confirm NVRAM write permissions and BIOS settings (ensure there is no “Firmware write protection” or vendor security policy preventing writes).
  • After update, a device does not boot a third‑party option ROM or a device driver firmware
  • Some OEMs choose to leave third‑party option ROM CA disabled by default; if you need to allow third‑party option ROMs, check the firmware setting (many vendors provide an explicit UI switch).
  • If a required vendor binary was signed by the 2011 CA only and the OEM firmware did not include the third‑party 2023 CA, vendor coordination will be necessary.
  • Event logs show “Under Observation — More Data Needed”
  • That status indicates Microsoft is collecting telemetry for that hardware model and the rollout is intentionally paused. Continue to keep systems updated and consult OEM advisories.

Critical appraisal — strengths and risks of Microsoft’s approach​

Microsoft’s strengths in this rollout:
  • Planned, collaborative approach. Rolling certificates forward was always necessary; doing so with OEM cooperation reduces mass disruption.
  • Confidence‑based rollout reduces risk. Targeting devices that report healthy telemetry first lowers the chance of widespread firmware issues.
  • Tooling and telemetry for administrators. Event IDs, registry flags, and PowerShell checks give enterprises the visibility they need.
Key risks and limitations:
  • OEM firmware lag remains the single greatest operational risk. Firmware updates are necessary on many platforms and vendors of older hardware may not provide them.
  • Complexity for heterogeneous fleets. Mixed vendors, BYOD, and legacy devices create a patching matrix that’s nontrivial to manage.
  • Historical precedent for DBX/DB problems. Past Secure Boot DB/DBX changes have occasionally interfered with third‑party bootloaders; while those incidents were limited, the possibility means testing is essential.
  • Edge cases in virtualization and special hardware may require vendor fixes; those fixes sometimes land later than Windows servicing, producing transient failures.
Overall, the move is technically correct and needed — but its success depends on vendor firmware readiness and responsible deployment by IT teams.

Practical timeline and recommended calendar for administrators and users​

  • Now → April 2026: Inventory and plan. Map devices to OEM support lists. Identify machines without available firmware updates and decide replacement or compensation windows.
  • April → May 2026: Pilot updates on representative hardware. Validate PowerShell checks, Event IDs, and BitLocker recovery procedures. Communicate to users about potential maintenance windows.
  • June 2026: The first set of 2011 certificates begin to expire. Devices that have not been transitioned may begin to lose the ability to receive future boot‑related protections.
  • June → October 2026: Staged expiry window continues. Monitor Event Viewer aggregate logs and servicing registry keys. Remediate stragglers.
  • Post‑October 2026: Devices that were not updated will remain operational but in a degraded state for receiving new Secure Boot protections. Those devices should be prioritized for retirement, firmware updates (if possible), or migration to supported platforms.
For home users: make sure your device is on a supported Windows release, Secure Boot is enabled, Windows Updates are applied, and you have installed any OEM BIOS updates that are available.
For IT admins: treat this as a firm deadline-driven firmware project with clear remediation steps, testing, and stakeholder communications.

Quick checklist — what you should do today​

  • Verify Secure Boot is enabled (Confirm-SecureBootUEFI).
  • Run Windows Update and install any available OEM firmware upgrades.
  • Check Event Viewer for Event IDs 1808 / 1801 and the registry servicing keys under HKLM\SYSTEM\CurrentControlSet\Control\SecureBoot\Servicing.
  • For Windows 10 that is out of support, enroll in ESU (if you cannot migrate immediately) to maintain the ability to receive these kinds of updates.
  • If you manage a fleet, build a pilot group and use Microsoft’s guidance to stage the rollout, collect telemetry, and expand once confidence is achieved.
  • Document BitLocker recovery key locations before performing firmware updates or servicing operations.

Final analysis and conclusion​

The Secure Boot certificate transition is an inevitable piece of maintenance for the modern Windows ecosystem: certificates expire, cryptographic practice advances, and the platform needs a refreshed trust chain to remain defendable against boot‑level threats. Microsoft’s staged, telemetry‑driven rollout reduces risk and gives OEMs and administrators the visibility they need, but it also exposes the persistent operational reality of firmware dependencies — vendor updates matter more than ever.
For most up‑to‑date personal PCs running supported Windows releases with Secure Boot enabled and regular Windows Updates applied, the change should be uneventful. For organizations and anyone running older or vendor‑abandoned hardware, this is an explicit calendar you must plan for: firmware updates, testing, and, in some cases, hardware replacement will be necessary to preserve full boot‑time protection.
Start checking your devices now rather than waiting for the expiration window. The tools to verify compliance — built‑in PowerShell checks, event logs, registry servicing keys, and OEM firmware release notes — are available today. Use them to build a short pilot and a remediation path so that when June 2026 arrives, you won’t be reacting to problems but simply confirming that your PCs are already protected under the new 2023 trust chain.

Source: CNET Windows Secure Boot Certificates From 2011 Will Be Expiring Soon. What You Need to Know
 

Back
Top