• Thread Author
Microsoft’s Secure Boot update FAQ makes clear that a coordinated, multi-step transition is now live: Windows will roll new 2023 signing certificates into UEFI variables and update the Windows boot manager to preserve Secure Boot protection ahead of the 2011 CA expirations, but the rollout requires careful testing, firmware readiness from OEMs, and updated recovery media to avoid data-loss or unbootable systems. (support.microsoft.com) (support.microsoft.com)

Background / Overview​

Secure Boot is the UEFI-era mechanism that prevents untrusted code from running before the operating system starts. Its trust model depends on a small set of certificates stored in firmware variables: the Platform Key (PK), Key Enrollment Key (KEK), the Allowed Signature Database (DB), and the Denied Signatures Database (DBX). When certificates that underpin those databases expire, the whole system that validates bootloaders and option ROMs must be updated to a new set of trust anchors, or devices will lose the ability to receive future Secure Boot-related updates and revocations. (support.microsoft.com)
Microsoft’s public guidance spells out the timeline and the technical replacements:
  • Several Microsoft-supplied certificates issued in 2011 (notably the “Microsoft Corporation KEK CA 2011”, “Microsoft UEFI CA 2011” and “Microsoft Windows Production PCA 2011”) are scheduled to expire beginning in June 2026, with one principal bootloader CA expiring in October 2026. (support.microsoft.com)
  • Microsoft will replace those with the 2023 family of certificates—e.g. Windows UEFI CA 2023, Microsoft UEFI CA 2023, and Microsoft Corporation KEK CA 2023—and will provide a mix of OS-side updates and guidance for OEM firmware updates. (support.microsoft.com)
This is not an abstract scheduling notice: the updates are already part of Windows servicing (packaged within Servicing Stack Updates and Cumulative Updates), and enterprise guidance and mitigation steps for CVE-2023-24932 and related boot-manager hardening are published and intended for immediate planning and testing. (support.microsoft.com)

What Microsoft’s FAQ actually says — the headline points​

Key facts from Microsoft’s FAQ​

  • Update sooner rather than later: Microsoft recommends applying certificate updates well before the June 2026 expirations. Devices that do not get the new 2023 certificates will eventually stop receiving updates for the boot manager and Secure Boot components, increasing risk of boot‑level compromise. (support.microsoft.com)
  • Delivery model: For many consumer and enterprise devices Microsoft will deliver the new certificates and boot manager updates via Windows Update (Microsoft‑managed rollout) if diagnostic data sharing and update channels allow it. IT‑managed fleets can use WSUS, Configuration Manager, Windows Update for Business, or offline MSU/DISM workflows. (support.microsoft.com)
  • Multi‑step mitigation: Microsoft’s rollout is staged and interlocked — first add the new certificate into the DB/KEK (so devices can trust new boot managers), then deploy a boot manager signed by the new CA, then (optionally but recommended for enforcement) add the old 2011 CA to DBX to revoke it, and finally apply a Secure Version Number (SVN) update to prevent rollbacks. Each step must be validated before the next. (support.microsoft.com)
  • Non‑rollbackable outcomes: Some of the mitigation steps (notably DBX additions that revoke trust in old CAs) are effectively permanent for devices that accept them; rolling them back is non-trivial and often requires reimaging or firmware-level intervention. (support.microsoft.com)
  • Practical caveats: Devices that have Secure Boot turned off, devices with firmware that refuses OS-initiated variable writes, older or non‑compliant firmware, and certain OEM‑specific security features can prevent an OS-side certificate update from being applied. Firmware readiness from OEMs is the largest operational unknown. (support.microsoft.com)
Each of these is documented in Microsoft’s FAQ and supporting KBs; the FAQ (KB5068008) is the canonical, user-friendly entry point Microsoft published on September 15, 2025. (support.microsoft.com)

Why this matters: security, compatibility, and risk​

Security improvements​

  • Prevents bootloader rollbacks and ensures future fixes are deliverable. The updated certificates and the SVN mechanism are designed to prevent attackers from installing an older, vulnerable Windows bootloader or boot components and to enable Microsoft to cryptographically sign future boot‑time security updates. This reduces the risk of bootkits and advanced persistent threats that target pre‑OS trust. (support.microsoft.com)
  • Revocations protect systems from previously trusted but now‑compromised binaries. Adding revoked certificates to DBX blocks known-bad boot managers and signing chains. (support.microsoft.com)

Compatibility and operational risks​

  • Firmware dependence is the gating factor. Many modern platforms allow the OS to add certificates to UEFI variables; others require OEM firmware updates (or firmware that was pre‑provisioned with the new keys). If device firmware doesn’t accept the OS-side writes, the update may fail or be incomplete and the device could be left in a mixed state. OEM coordination is therefore essential. (support.microsoft.com)
  • BitLocker and recovery media interruptions. Some users and admins will see BitLocker enter recovery mode after these changes. If recovery keys aren’t available, systems can be effectively bricked until the key is recovered. Microsoft explicitly warns administrators to ensure recovery keys and updated recovery media exist before wide deployment. (support.microsoft.com)
  • Dual‑boot and Linux edge cases. Many Linux distributions use a small shim signed with Microsoft’s key so they can boot on Secure Boot machines. That shim and its signing chain are often tied to Microsoft-provided keys; if firmware lacks the new 2023 CA entries or if OEMs do not update firmware, some Linux installs and shims can fail to boot until the firmware is updated or re‑signed/re‑enrolled. Independent reporting and community guides have highlighted potential disruptions for Linux users. (tomshardware.com)
  • Virtualization and cloud platforms matter. VMs rely on virtual firmware or host firmware. Cloud and hypervisor vendors need to include the new certificates in their virtualized firmware or provide VM-level updates; otherwise, long‑running VMs may not receive the DB/KEK updates. Microsoft documentation explains both host-side and guest-side approaches. (support.microsoft.com)
In short: the change is security‑positive but operationally impactful. The work to make it smooth rests with OEM firmware updates, IT testing, and updated recovery/media procedures.

The mechanics — what updates do, step by step​

Microsoft has broken the process into ordered steps (mitigations) and has published commands and detection checks for administrators to script and monitor the rollout. The canonical mitigation sequence — as used for CVE-related guidance and the 2023 CA rollout — is:
  • Add the Windows UEFI CA 2023 certificate to the device firmware DB so firmware can trust boot managers signed by the new CA. This is usually an OS-side change that writes into UEFI variables where permitted. (support.microsoft.com)
  • Update the Boot Manager on disk to a Windows UEFI CA 2023–signed version. This is an OS file change that ensures the next boots use the new-signed boot manager. (support.microsoft.com)
  • Add the old 2011 PCA to DBX (revocation) so the old certificates are denied by firmware — effectively preventing older signed boot managers from running. This step is the one that makes the change irreversible for most practical recovery paths. (support.microsoft.com)
  • Optionally apply the Secure Version Number (SVN) update to the firmware. This instructs the firmware to require the boot manager to carry an SVN equal to or greater than firmware’s value — preventing silent rollbacks to older boot managers. After SVN enforcement, older bootable media (ISOs, PXE, USB) must also be updated to use the new signing chain and SVN. (support.microsoft.com)
Microsoft packages these changes in servicing updates; enterprise rollouts should separate the OS-side changes from the DBX revocation and SVN enforcement, validating each step carefully before proceeding. (support.microsoft.com)

What administrators must do — an operational checklist​

The FAQ and supporting KBs provide a practical, prioritized checklist. The following distills those recommendations into a runnable plan for IT teams and advanced users.
  • Immediate inventory and classification:
  • Determine which devices have Secure Boot enabled (run msinfo32 and check “Secure Boot State”). Devices with Secure Boot disabled are not candidates for automatic OS-side updates until re-enabled.
  • Record OEM, model, firmware/BIOS version, and update channel (Windows Update, WSUS, Intune, air‑gapped).
  • Pilot (first 72 hours):
  • Choose small representative pilot groups across major OEMs and firmware branches.
  • Apply the combined SSU + LCU package that carries the certificate update to those pilots (Microsoft often ships the changes in combined updates to avoid sequencing issues).
  • Confirm boot behavior, BitLocker recovery behavior, and restore flows (Reset, WinRE, cloud recovery) before expanding.
  • Firmware coordination (2–6 weeks):
  • Contact OEMs for firmware that supports variable writes and that may ship defaults with the 2023 certificates prepopulated. Coordinate planned firmware updates to the same devices where possible. Firmware readiness is generally the gating item for full automation. (support.microsoft.com)
  • Staged rollout (6–20 weeks):
  • Expand from pilots via Windows Update for Business rings, WSUS, Configuration Manager, or Intune. Monitor event logs and Windows Health Dashboard telemetry for failed variable writes or BitLocker triggers.
  • Air‑gapped or restricted environments:
  • Use the Microsoft Update Catalog to download the MSU bundles and install offline via DISM or Add‑WindowsPackage, and follow Microsoft’s offline guidance. Build and verify updated bootable media and PXE images in the lab before production use.
  • Recovery and media update:
  • Update ISO, USB, PXE boot media and documentation so they carry the new boot manager signing and, if SVN is enforced, the proper SVN value. Microsoft provides specific KBs that explain how to update installation media. (support.microsoft.com)
  • Document exceptions and mitigations:
  • Keep a register of devices where the update fails due to firmware limitations. Options include replacing hardware, isolating unpatchable devices, or maintaining separate mitigations and compensating controls.

Practical guidance for home users and enthusiasts​

  • Confirm Secure Boot and backup keys:
  • Run msinfo32 and verify “Secure Boot State = On”. If it’s off, you won’t receive the OS-side variable updates until you enable Secure Boot (and enabling can trigger other compatibility checks).
  • Back up BitLocker recovery keys and store them safely; updating Secure Boot or resetting firmware can trigger BitLocker recovery prompts.
  • Let Windows Update manage it if you are a consumer:
  • For most consumer devices that opt into Microsoft-managed updates, Windows Update will deliver the 2023 CA updates with minimal manual steps. Ensure your device is set to receive updates and that you’re not blocking required diagnostic levels that Microsoft needs to validate the rollout. (support.microsoft.com)
  • If you dual‑boot with Linux:
  • Use mainstream distributions that supply Microsoft‑signed shims (Ubuntu, Fedora, etc.) and test them on a representative device before applying the full remediation. If your Linux environment uses a custom shim or manually enrolled keys, prepare a re-enrollment plan. Independent reporting shows that some Linux users will need to update shim or enroll new keys if firmware doesn’t receive the 2023 CA. (tomshardware.com)
  • Update recovery media:
  • Create a fresh USB recovery drive after you have validated the new boot manager on at least one test device; Microsoft warns that older recovery media may be blocked once DBX revocations and SVN enforcement are in place. (support.microsoft.com)

Technical deep dive: DB, DBX, KEK, PK, and SVN explained​

  • PK (Platform Key): Highest-level key, typically owned by the OEM, that controls change of KEK and DB/DBX.
  • KEK (Key Enrollment Key): Used to validate updates to DB and DBX; Microsoft’s KEK entry is what allows OS-side updates to write DB/DBX in many devices.
  • DB (Allowed Signature Database): Contains certificates and hashes for allowed boot components (boot manager, option ROMs).
  • DBX (Forbidden Signature Database): Contains certificates and hashes that should be blocked; adding a CA to DBX will render all binaries signed by that CA untrusted by firmware.
  • SVN (Secure Version Number): A numeric tag stored in firmware and in the boot manager; a boot manager will refuse to run if its built-in SVN is lower than the firmware’s SVN. This prevents rollback attacks and ensures that once firmware requires a higher SVN, only newer (patched) boot managers will run. Microsoft has included SVN as a later step in its mitigation sequence and requires administrators to update bootable media accordingly. (support.microsoft.com)
Note: SVN is effective but operationally consequential — once firmware’s SVN is raised and enforced, many older media and workflows break until they are refreshed and re-signed.

Strengths, limitations, and where things could go wrong​

Strengths​

  • Clear Microsoft runbook and staged approach. The staged mitigations (DB update → boot manager update → DBX revocation → SVN) minimize the risk of bricking devices when followed correctly. Microsoft has published commands, detection commands, and event IDs to help admins script and monitor progress. (support.microsoft.com)
  • Bundled SSU+LCU packaging reduces sequencing errors. Packaging servicing stack updates with cumulative updates reduces problems where prerequisite servicing updates are missed.
  • Long lead time and multiple support articles. Microsoft’s documentation and KBs provide a multi-month runway for IT teams to inventory, pilot, and stage rollouts. (support.microsoft.com)

Limitations and real risks​

  • OEM firmware variability remains the wildcard. If firmware rejects OS-side variable writes or resets variables when Secure Boot is toggled, devices can be left in partial states or require OEM firmware updates — which are outside IT’s direct control.
  • Potential BitLocker lockouts. Admins who don’t preserve or securely store BitLocker recovery keys risk widespread recovery events.
  • Linux and alternative OS disruption. The majority of consumer firmware ships trusting Microsoft’s signing infrastructure; as Microsoft rotates keys, Linux distributions and shims must adapt and/or users must rely on updated firmware. Independent reporting warns of possible compatibility headaches for non‑Windows systems. (tomshardware.com)
  • Rollback complexity. Once DBX entries are applied or SVN is enforced, rolling back is close to impossible without image restoration or vendor-specific firmware tooling. Organizations must plan for that permanence. (support.microsoft.com)
Where a claim is environment-dependent — for example, whether a specific OEM model will accept the OS-made variable change — treat the claim as conditional: test and confirm on the device family before wide deployment.

Minimal set of commands and checks (high‑value examples)​

  • Verify DBX contains a string (PowerShell, run as Admin):
  • [System.Text.Encoding]::ASCII.GetString((Get-SecureBootUEFI dbx).bytes) -match 'Microsoft Windows Production PCA 2011' (support.microsoft.com)
  • Apply the SVN firmware update (example registry command used in Microsoft guidance):
  • reg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Secureboot /v AvailableUpdates /t REG_DWORD /d 0x200 /f
  • Start-ScheduledTask -TaskName "\Microsoft\Windows\PI\Secure-Boot-Update" (support.microsoft.com)
  • Offline install via DISM (example for image servicing, adjust package path as needed):
  • DISM /Online /Add-Package /PackagePath:C:\packages\Windows11.0-KB5063878-x64.msu
Administrators should script detection and remediation, log event IDs defined by Microsoft (for example, KB5016061 event mappings), and use telemetry to make rollout decisions. (support.microsoft.com)

Final analysis and recommendations​

This Secure Boot certificate transition is one of those rare updates that blends cryptography, firmware policy, and mass servicing logistics. The net result — a stronger, harder‑to‑circumvent Secure Boot — is a clear security win for the ecosystem. However, the project’s success depends less on Microsoft tooling and more on the diversity of OEM firmware behavior and the quality of each organization’s operational preparation. (support.microsoft.com)
Key takeaways and action items:
  • Start inventorying now. Map Secure Boot state, OEM model, firmware versions, and update channels.
  • Pilot early and include recovery scenarios. Validate Reset, WinRE, recovery USB, and BitLocker recovery flows in a controlled pilot before moving to larger rings.
  • Coordinate with OEMs for firmware updates. Firmware readiness is frequently the gating issue; proactively seek OEM firmware that either pre-populates the 2023 CA or enables the OS-side write. (support.microsoft.com)
  • Update all bootable media before DBX or SVN enforcement. ISOs, PXE, and USB media must be refreshed to the new signing chain and, if SVN is enforced, to matching SVN values. (support.microsoft.com)
  • For home users, prefer Microsoft‑managed updates and back up BitLocker keys. If you are comfortable with Windows Update, this path reduces manual steps; if you dual‑boot with Linux, test first. (support.microsoft.com)
Cautionary note: specific hardware, firmware versions, and third‑party bootloaders behave differently. While Microsoft’s FAQ and KBs are authoritative for the Windows-side mechanisms, firmware behavior and OEM readiness are variable and should be verified per model. Any claim that a particular model will succeed without firmware updates should be tested; if no OEM firmware exists for a device, expect an exception path.

This transition is manageable — provided organizations and users treat it as an operational project, not a background patch. With clear testing, updated recovery procedures, and OEM coordination, Secure Boot’s renewed certificate infrastructure will close an important attack surface for the years ahead. (support.microsoft.com)

Source: Microsoft Support Frequently asked questions about the Secure Boot update process - Microsoft Support