• Thread Author
IT administrators now have practical, fleet-scale ways to check whether Windows devices are carrying the updated Secure Boot certificate chain and whether they’re ready to accept the upcoming Secure Boot updates — a crucial capability as Microsoft and OEMs rotate the platform’s cryptographic trust anchors ahead of the 2011 CA expirations in 2026.

Technician monitors secure-boot readiness on multiple screens in a data-center control room.Background / Overview​

Secure Boot is the UEFI firmware mechanism that enforces a small set of cryptographic authorities to validate boot components before the operating system runs. When those authorities (the CAs and Key Exchange Keys stored in the firmware DB/KEK/DBX variables) approach the end of their lifetimes, Microsoft and OEMs must provision replacement certificates so devices can continue to accept signed boot updates and revocations. Microsoft published a playbook and management controls that let administrators monitor, pilot, and — where necessary — trigger the replacement flow from the OS side.
Why this matters: the legacy Microsoft-supplied CAs created around 2011 begin to expire in mid‑2026, and a second related authority follows later in 2026. If a device still depends solely on the old 2011 authorities when those certificates lapse, Windows will be unable to deliver future Secure Boot updates or boot-manager re-signing under the new 2023 CA family — putting those machines at risk of losing pre-boot mitigations or encountering compatibility failures for newly signed components. Microsoft’s published guidance frames the replacement as an operational project for IT teams — not a purely mechanical monthly patch — because it spans firmware, OS servicing, and vendor coordination.

What changed: fleet-scale visibility and controls for admins​

Microsoft and its management tooling now provide multiple, auditable ways for IT teams to determine Secure Boot readiness and certificate state across managed devices:
  • Intune (Settings Catalog) exposes specific Secure Boot settings that map to the OS servicing controls: Enable Secureboot Certificate Updates, Configure Microsoft Update Managed Opt‑In, and Configure High Confidence Opt‑Out. These settings let you opt devices into the OS-driven enrollment flow, control whether devices are eligible for Microsoft’s telemetry‑gated rollout, and block automatic monthly delivery when required for compliance testing.
  • Group Policy and registry controls are documented and can be set centrally. The core registry path the Secure Boot servicing task inspects is HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecureBoot\Servicing and its keys such as AvailableUpdates, MicrosoftUpdateManagedOptIn, HighConfidenceOptOut, UEFICA2023Status, and UEFICA2023Error. Administrators can use these values to request the full staged update bitmask, opt devices into/out of Microsoft-managed flows, and monitor per-device status indicators.
  • Microsoft provides a domain/enterprise CLI (WinCS) for large-scale, scripted control, plus registry or GPO approaches for WSUS/ConfigMgr-managed environments. The playbook outlines when to use the Microsoft-managed telemetry-gated path (lowest effort for consumer-like devices) versus the registry/GPO/WinCS paths (recommended for managed fleets that need explicit control).
  • PowerShell cmdlets and low-level UEFI checks (Confirm‑SecureBootUEFI and Get‑SecureBootUEFI) allow per-device, scriptable verification of Secure Boot state and inspection of the KEK/DB/DBX contents for strings such as Windows UEFI CA 2023. These commands are the basis for fast inventory scripts and remote checks.
Taken together, these options let admins both obtain read-only status (is Secure Boot on? do the DB/KEK contain the 2023 CA?) and, when appropriate, trigger the staged updates in a controlled way across pilot and production rings.

How to verify Secure Boot status — tactical checks for admins​

Below are the standard checks that should be incorporated into automated inventory jobs and manual spot checks. Each check is safe, read-only, and scriptable where noted.

GUI quick checks (fast, per-device)​

  • Run System Information (msinfo32). Confirm BIOS Mode = UEFI and Secure Boot State = On/Off/Unsupported. This is the canonical visual check many OEM guides reference.

PowerShell (scriptable, recommended for fleet sweeps)​

  • Confirm Secure Boot is enabled:
  • Confirm‑SecureBootUEFI — returns True when Secure Boot is active; False when supported but disabled; and an error when UEFI isn’t present.
  • Inspect UEFI variables:
  • Get‑SecureBootUEFI db — returns the DB bytes; you can search them for the string "Windows UEFI CA 2023".
  • Example quick test (run as Administrator): (::ASCII.GetString((Get‑SecureBootUEFI db).bytes) -match 'Windows UEFI CA 2023') — returns True/False.
These PowerShell checks are the foundation for scalable scripts that inventory hundreds or thousands of endpoints. Use PowerShell remoting, Intune scripts, or ConfigMgr compliance scripts to collect results centrally.

Registry indicators (diagnostic, machine-level progress)​

  • Poll HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecureBoot\Servicing for:
  • AvailableUpdates — the bitmask that requests specific steps of the servicing flow (for example, 0x40 for DB updates, or the enterprise full bitmask 0x5944 for a complete sequence).
  • UEFICA2023Status — string values that progress from NotStarted → InProgress → Updated as the sequence runs.
  • UEFICA2023Error — non‑zero indicates a failure code to investigate.
    Administrators can use Intune to push these registry values via Settings Catalog, or use Group Policy templates that map to the same keys.

Event logs (for success/failure signals)​

Key event IDs to monitor via Event Forwarding or SIEM:
  • Event ID 1808 — success: indicates the device applied the new Secure Boot certificates and updated the boot manager.
  • Event ID 1801 — failure during certificate apply.
  • Event ID 1795 — firmware rejected an authenticated variable write (common when firmware refuses OS-initiated KEK/DB changes).
Combining the PowerShell checks, registry indicators, and event logs gives a reliable per-device picture: Is Secure Boot on? Does the firmware already include the 2023 CA? Did the OS servicing task attempt or complete the enrollment? Use all three vectors in your inventory reporting to avoid false positives.

How to trigger or accelerate updates safely (when needed)​

Microsoft and the playbook provide supported ways to trigger the OS‑driven enrollment on a device-by-device basis or at scale — but they should be used only after you’ve validated firmware readiness and BitLocker safeguards in a pilot.
  • Local trigger (admin on a single device): set the registry AvailableUpdates bit to request DB change and then start the scheduled servicing task:
  • reg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecureBoot /v AvailableUpdates /t REG_DWORD /d 0x40 /f
  • Start-ScheduledTask -TaskName "\Microsoft\Windows\PI\Secure-Boot-Update"
  • Reboot twice and verify the DB contains "Windows UEFI CA 2023" via Get‑SecureBootUEFI.
  • Enterprise trigger (GPO / registry / WinCS): set AvailableUpdates to the recommended enterprise bitmask (documented in Microsoft’s playbook) — for example the full sequence bitmask 0x5944 — and use WinCS or Group Policy to apply this value across rings after successful pilot validation. Be aware: once certificate entries are written into firmware variables they cannot be removed via OS control; GPO removal does not revert applied certificate changes.
  • Intune-managed opt-in: use the Windows 10 and later Settings Catalog profile to set Enable Secureboot Certificate Updates = Enabled, Configure Microsoft Update Managed Opt‑In = Enabled/Disabled and Configure High Confidence Opt‑Out appropriately for your risk posture and telemetry allowances. For telemetry-gated Microsoft-managed rollout, ensure diagnostic data is configured as required for CFR signaling.
Important safety notes when triggering:
  • Always ensure BitLocker protectors are suspended or that recovery keys are escrowed before the reboot sequence that applies the boot-manager replacement; otherwise you will likely trigger BitLocker recovery prompts on affected devices.
  • Validate OEM firmware readiness first: some devices require vendor firmware updates before they will accept KEK/DB changes; if firmware rejects writes, Event ID 1795 and UEFICA2023Error will indicate that and OEM intervention is usually required.

Deployment options — tradeoffs and when to use each​

  • Microsoft-managed (telemetry-gated) rollout
  • Best for consumer-style or homogenous fleets where telemetry policy is acceptable and where you prefer minimal operational overhead.
  • Tradeoff: requires devices to be eligible under Microsoft’s confidence buckets; not suitable where you need explicit, auditable control for compliance.
  • Registry / Group Policy trigger
  • Best for tight enterprise control and where you want predictable sequencing across pilot rings.
  • Tradeoff: requires careful orchestration and validation of BitLocker/WinRE and firmware interactions; registry triggers persist in system state.
  • WinCS (domain-level CLI) / scripted enterprise approach
  • Best for large, domain-joined estates and when combined with existing CMDB/ConfigMgr automation.
  • Tradeoff: requires strong change control and monitoring for UEFICA2023Error results and firmware rejections.
  • OEM firmware provisioning
  • Required where firmware refuses OS-initiated writes; OEMs can embed KEK/DB changes directly into firmware updates.
  • Tradeoff: depends on vendor cadence, model support, and sometimes device end-of-support constraints.

Operational risks and caveats (what to watch for)​

  • Firmware diversity is the dominant operational risk. A single vendor model or firmware family that refuses OS writes will become a remediation case requiring OEM firmware or field replacement. Document these devices early and escalate to procurement/OEM teams.
  • Telemetry gating influences Microsoft’s automated reach. Environments that disable or restrict diagnostic/telemetry data as a policy may not be automatically targeted by Microsoft’s CFR path and will require manual enrollment methods. Plan accordingly.
  • BitLocker and pre-boot encryption interactions are real and frequent. Firmware changes that swap boot managers or alter Secure Boot variables often trigger BitLocker recovery unless protectors are suspended or keys are escrowed. Make BitLocker key escrow and suspension part of every pilot checklist.
  • Virtualized and cloud images can behave differently: hypervisor vendors may need to update virtual firmware images or allow guest-driven enrollment. Test VMs and cloud images early because some virtual platform images may not accept the new certificates or may need the host to be updated.
  • DBX revocations and irreversible changes: some DBX (revocation) updates are effectively permanent on many platforms. Microsoft and OEMs intentionally sequence these changes cautiously; administrators must not apply broad DBX revocations without thorough testing.

Practical, prioritized checklist for IT teams (recommended sequence)​

  • Inventory (immediate)
  • Gather OEM model, firmware/UEFI version/date, Secure Boot state, TPM presence, partition style (GPT/MBR), Windows build, and whether the device accepts OS-initiated UEFI writes. Use msinfo32, Confirm‑SecureBootUEFI, and Get‑SecureBootUEFI as part of this sweep.
  • Map OEM readiness (days 0–7)
  • For each OEM/model, check vendor advisories for required BIOS/UEFI versions. Where firmware updates are necessary, plan pilot deployments.
  • Pilot (weeks 1–3)
  • Select representative models and test the full sequence: DB update → KEK write → boot-manager replacement → reboot and BitLocker recovery checks. Monitor UEFICA2023Status and Event ID 1808 for positive confirmation.
  • Update images and recovery media (before broad rollout)
  • Inject required cumulative updates and Safe OS dynamic updates into golden images and WinRE so recovery and reimaging workflows will not rely on expired authorities. Test Reset/Refresh and bare‑metal scenarios.
  • Deploy in waves (controlled)
  • Use Intune/Group Policy/WinCS to expand from pilot → broad test → production. Track UEFICA2023Error cases and escalate non‑zero codes to OEMs where firmware rejects writes.
  • Document exceptions and replacements
  • For unsupported/legacy devices that cannot be updated, record compensating controls (segmentation, restricted access) and plan replacement timelines ahead of the 2011 CA expirations.

Example PowerShell snippets administrators should embed in scripts​

  • Confirm Secure Boot state (returns True/False):
    Confirm-SecureBootUEFI
    Use this for simple on/off checks across your fleet.
  • Check DB contents for the new CA (admin PowerShell):
    (::ASCII.GetString((Get-SecureBootUEFI db).bytes) -match 'Windows UEFI CA 2023')
    A True result means the DB contains the 2023 certificate strings. Use this to categorize devices that are already enrolled.
  • Trigger a local DB update (admin, for single-device testing only):
    Code:
    reg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecureBoot /v AvailableUpdates /t REG_DWORD /d 0x40 /f
    Start-ScheduledTask -TaskName "\Microsoft\Windows\PI\Secure-Boot-Update"
    Restart-Computer -Force
    Reboot twice and re-check the DB to validate progress. Do not run this at scale until you validate BitLocker and firmware behavior in a pilot.

Critical analysis — strengths, limitations, and strategic implications​

Strengths
  • The new, documented visibility and the Intune/GPO/WinCS controls give enterprises actionable tools to inventory and manage the certificate rotation rather than guessing or reacting to failures. The availability of per‑device status keys and event IDs enables reliable telemetry and SIEM integration.
  • Microsoft’s telemetry‑gated rollout model reduces blast radius for automatic enrollments on devices that demonstrate healthy update behavior, which is prudent for a change that touches firmware trust anchors. The combination of automated and manual controls gives administrators the ability to choose risk vs. operational overhead.
  • The power to inspect DB/KEK/DBX via PowerShell and the provision of a WinCS tool for domain-scale orchestration are strong enablers for scripted, auditable operations — exactly what larger enterprise teams need.
Limitations and risks
  • Firmware fragmentation and OEM readiness remain the single greatest operational constraint. Where firmware refuses OS writes or where vendors do not produce timely updates, individual devices must be remediated or replaced — sometimes at scale. This is an operational, not a purely technical, problem.
  • Telemetry gating and Microsoft-managed rollouts work well for many devices, but they do not cover closed networks, air-gapped systems, or privacy-restricted fleets that opt out of required diagnostic data. Those devices will likely require manual enrollment and careful coordination.
  • Irreversible DBX revocations and permanent record changes make thorough piloting essential; mistakes or insufficient pilot coverage could have long-term compatibility consequences for multi‑boot systems, legacy option ROMs, or specialized hardware.
Strategic implication
  • Treat this work as a cross-functional program: security teams, endpoint management, procurement, and OEM/vendor management must coordinate. The operational window is bounded (mid‑2026 and later deadlines exist), and the cost of last‑minute remediation is materially higher than phased, pre-planned rollouts.

Closing recommendations and the immediate three-step plan for admins​

  • Inventory now. Run Confirm‑SecureBootUEFI and Get‑SecureBootUEFI across representative devices and centralize results. Populate a matrix of OEM/model/firmware versions to spot likely problem sets.
  • Pilot early. Pick a small but representative set of devices from each OEM/firmware family. Validate the full servicing flow, BitLocker behavior, WinRE and recovery image compatibility, and event log signals (Event ID 1808 success). Expand rings only after repeated success across device classes.
  • Coordinate firmware and imaging workstreams. Request OEM firmware for devices that reject writes, and update golden images and WinRE so recovery does not rely on expired authorities. Maintain an exception register for devices scheduled for replacement.

The Secure Boot certificate rotation is not an abstract security exercise — it’s a time‑bound, cross‑ecosystem operation that must be inventoried, piloted, and executed with the same change control discipline you apply to major firmware or platform changes. Use the Intune and management controls to get visibility today, couple PowerShell checks with registry and event log telemetry for reliable reporting, and plan firmware coordination and image updates so you aren’t forced into emergency device replacements as the 2011 CAs lapse. Act now, test responsibly, and document exceptions — that approach will minimize disruption and keep your fleet able to receive pre‑boot security updates going forward.

Source: Neowin https://www.neowin.net/news/it-admi...re-boot-in-windows-devices-across-their-firm/
 

Microsoft is quietly rolling out a coordinated update to refresh long‑lived Secure Boot certificates because a set of Microsoft‑issued UEFI certificates from 2011 will begin expiring in 2026 — and systems that don’t receive the replacement “2023” certificate family beforehand risk losing the ability to receive pre‑boot security fixes and to validate newly signed boot components.

Glowing blue diagram shows Secure Boot and firmware security on a motherboard.Background / Overview​

UEFI Secure Boot is the firmware‑level gatekeeper that enforces a cryptographic chain of trust during system startup. Firmware stores certificate authorities (CAs) and signing keys in variables commonly referred to as PK (Platform Key), KEK (Key Exchange Key), DB (allowed signatures) and DBX (revoked signatures). When a CA embedded in firmware reaches its expiration date, that platform can no longer accept updates or trust signatures that depend on the expired CA unless a new trust anchor is present.
Microsoft and many OEMs historically provisioned Microsoft‑issued CA entries into platform firmware around 2011. Those certificates were intentionally long‑lived, but the calendar has caught up: several of the 2011 Microsoft CAs are scheduled to begin expiring in mid‑2026, with an additional Windows production PCA expiring later in 2026. Microsoft prepared a replacement family of certificates issued in 2023 (the “2023 CA” family) and is delivering them via staged Windows servicing and OEM firmware updates to preserve Secure Boot continuity.

What exactly is expiring — timeline and mapping​

Microsoft’s public guidance groups the expirations into two windows and maps each expiring CA to its 2023 replacement.
  • June 2026 — key Microsoft 2011 CAs used for KEK and UEFI signing (affects KEK updates and third‑party bootloader/option ROM signatures).
  • October 2026 — Microsoft Windows Production PCA 2011 (affects signatures for the Windows Boot Manager).
The canonical mapping Microsoft published and that OEM advisories echo is:
  • Microsoft Corporation KEK CA 2011 → replacement: Microsoft Corporation KEK 2K CA 2023 (for KEK, signs DB/DBX updates).
  • Microsoft UEFI CA 2011 → replacements: Microsoft UEFI CA 2023 and Microsoft Option ROM UEFI CA 2023 (splits previous trust roles so option ROMs can be trusted independently).
  • Microsoft Windows Production PCA 2011 → replacement: Windows UEFI CA 2023 (used to sign Windows Boot Manager binaries).
Those month‑level windows are the operational deadlines; some OEMs publish day‑level dates for specific platforms (for example, HP and Surface advisories listed precise June and October days for particular models). Administrators and device owners should treat month‑level expiry windows as the planning horizon while verifying model‑level dates in vendor guidance.

How Microsoft is delivering the fix​

Microsoft’s approach is deliberately conservative and multi‑pronged: it combines OS‑side servicing logic (pushed via Windows Update) with firmware updates from OEMs, plus administrative controls for enterprises.
Key elements of the rollout:
  • OS‑side servicing packages delivered in the regular cumulative update cadence include device‑targeting metadata and health‑gating logic that identify systems eligible for automatic enrollment of the 2023 CA set. For Windows 11 this functionality is included in the cumulative package KB5074109; for supported Windows 10 builds the servicing package is KB5073724.
  • A scheduled servicing task runs on endpoints to apply the enrollment steps in a specific order designed to avoid breaking the boot chain. The OS flow can add certificates into DB/KEK variables and, where needed, replace the Windows Boot Manager with a binary signed under the new PCA to complete the trust hand‑off.
  • Microsoft gates automatic enrollment using telemetry/health signals: the company will attempt automatic certificate updates only on devices that demonstrate “sufficient successful update signals” to reduce the risk of applying changes to hardware that cannot accept them. Administrators retain manual deployment options (registry keys, Group Policy/Intune controls and WinCS-based targeting) for managed fleets and special environments.
  • OEMs are shipping firmware (BIOS/UEFI) updates and publishing per‑model guidance listing minimum firmware revisions required to accept the OS‑driven writes or to perform KEK updates. Some older platforms require an OEM firmware intervention for KEK writes.
This hybrid model — OS‑driven enrollment where possible, OEM firmware updates where necessary — is intended to maximize coverage while minimizing accidental regressions across the enormous diversity of PC firmware implementations.

The technical mechanics — sequence that preserves boot trust​

Microsoft’s published servicing logic performs the certificate hand‑off in an order‑sensitive sequence so a device is never left unable to validate its bootloader:
  • Add the Windows UEFI CA 2023 to the firmware DB.
  • Where the old Microsoft UEFI CA 2011 exists, add Microsoft UEFI CA 2023 and Microsoft Option ROM UEFI CA 2023 to DB. Splitting the UEFI CA into two certificates improves policy control for option ROMs vs. bootloaders.
  • Add Microsoft Corporation KEK 2K CA 2023 to KEK (this often requires OEM‑signed KEK material; firmware cooperation is necessary on some devices).
  • Replace the Windows Boot Manager with a version signed under Windows UEFI CA 2023, then reboot to complete the trust hand‑off.
Each step is designed so the platform continues to trust at least one valid signing path as the new certificates are introduced. That order prevents an endpoint from losing trust in the Boot Manager mid‑process while still allowing future updates to use the new CAs.

Who is affected — and who is already safe​

  • Systems manufactured since 2024 often ship with the 2023 certificates already embedded in firmware and therefore are typically already safe.
  • Devices that still have the 2011 Microsoft CA entries in firmware — which includes many systems built in the 2012–2023 window — are in scope and should receive the replacement certificates via Microsoft’s staged OS servicing or via OEM firmware updates.
  • If Secure Boot is disabled on a device, these certificate updates do not change behavior for that platform (but disabling Secure Boot significantly reduces boot‑time protections).
  • Air‑gapped systems, regulated environments that block telemetry, or endpoints that disable Windows Update may not receive automatic enrollment and therefore require manual remediation workflows coordinated with OEMs and IT teams.
  • Windows 10 Extended Security Updates (ESU) and supported Windows 10 builds are included in the servicing story, but administrators of legacy or out‑of‑support OS builds need to verify vendor and Microsoft guidance for compatibility.

Practical risks if you don’t update​

If a device retains only the 2011 CA entries when those CAs lapse, the practical consequences include:
  • Loss of the ability to receive future Secure Boot‑level updates for pre‑boot components, because the firmware cannot accept new signatures tied to the expired CA. That blocks security fixes for bootloaders and related pre‑OS binaries.
  • Potential inability to validate newly signed bootloaders, shim binaries, or option ROMs released after the cut‑over — that could manifest as failed boots, blocked drivers, or compatibility errors.
  • Unexpected BitLocker recovery prompts if the boot chain is altered in a way BitLocker interprets as tampering, leaving users scrambling to recover drives.
  • Disruption to anti‑cheat systems and other integrity‑sensitive software that depend on a functioning Secure Boot chain — a real concern for gamers and competitive platforms.
These are operational, not hypothetical, risks: modern bootkits (for example, BlackLotus) and past vulnerabilities have demonstrated that pre‑OS code can be an attractive and persistent attack surface. Keeping trust anchors current is preventive maintenance with real security consequences.

Strengths of Microsoft’s approach​

Microsoft’s chosen strategy has several notable strengths:
  • Phased, telemetry‑gated rollout reduces the chance of applying disruptive changes to hardware that cannot accept OS‑driven DB/KEK updates. This reduces the likelihood of mass regressions.
  • OS‑side enrollment allows Microsoft to reach a large percentage of modern devices without forcing every user to run a firmware‑flashing process, increasing coverage and reducing user intervention.
  • Splitting CA roles (separate Option ROM and Boot Manager CAs) improves the granularity of trust and policy control, which can reduce the attack surface and make revocation decisions more precise.
  • Administrative controls (registry / Group Policy / Intune / WinCS) give enterprise admins the tools to pilot and manage the rollout, keeping large fleets predictable.
Those design choices indicate Microsoft understands both the security urgency and the engineering fragility of the firmware ecosystem, and that it is balancing safety with broad coverage.

Risks, unknowns, and failure modes​

No large ecosystem change is risk‑free. Key concerns administrators should account for:
  • Telemetry‑gating can leave vulnerable endpoints behind. Systems that block telemetry, operate air‑gapped, or have complicated provisioning pipelines may not meet Microsoft’s “high‑confidence” threshold and therefore will miss automatic enrollment unless IT intervenes. That creates a patch gap precisely where manual processes are expensive.
  • OEM firmware variability: some older platforms require OEM‑signed KEK updates that cannot be applied via OS‑side writes. If an OEM delays firmware updates or withdraws support for a model, owners of those devices may face a manual and potentially unsupported remediation path.
  • Update regressions: although Microsoft is gating the rollout, history shows firmware changes can behave unexpectedly on specific models. A small number of regressions could produce larger operational headaches for admins who run tightly controlled environments.
  • Visibility and tooling gaps: smaller shops and less technical users may not have an easy way to verify whether a device has the 2023 CA family installed — vendor diagnostic tools or OEM advisories are the canonical answers, but those resources vary in clarity and accessibility.
  • Recovery image readiness: provisioning and recovery images must be updated to include the new boot manager signed under the 2023 PCA, otherwise recovery operations could trigger the same signature mismatches Microsoft is trying to prevent. OEMs are updating recovery pipelines, but administrators should confirm their images are current.
In short: the plan is sensible but imperfect, and it shifts the remaining burden to OEMs and device owners to confirm readiness.

Step‑by‑step guidance for home users, power users, and admins​

Below are practical steps tailored to different audiences. Prioritize them in the order shown.
  • For all users (home and enterprise):
  • Keep Windows Update enabled and install cumulative updates promptly. The updates that carry the enrollment logic are included in regular servicing packages; let Windows Update do its job.
  • Apply firmware (BIOS/UEFI) updates from your device vendor when they are published. OEM advisories explain whether a firmware update is required for your model.
  • For power users and gamers:
  • Install the January/early 2026 cumulative updates (notably the packages containing KB5074109 or KB5073724 where applicable) and verify anti‑cheat software is up to date. These updates include the OS mechanics for certificate enrollment.
  • Check OEM support pages for model‑level guidance; confirm whether your machine shipped with 2023 certs already. If you rely on third‑party boot components, verify vendor compatibility.
  • For IT administrators and fleet managers:
  • Inventory devices to identify which platforms still rely on 2011 firmware CAs and which have the 2023 CA family already embedded.
  • Pilot the OS‑driven enrollment on representative hardware and monitor for regressions; use telemetry to confirm success before broader deployment.
  • Coordinate with OEMs for firmware revisions where KEK updates require vendor‑signed intervention. Maintain a timeline for legacy hardware that needs firmware from vendors.
  • Update provisioning and recovery images to include the new boot manager signed under the Windows UEFI CA 2023 to avoid surprises during recovery operations.
  • For air‑gapped or telemetry‑off systems, implement manual enrollment workflows using the documented registry/GPO/WinCS methods and keep an auditable log of remediation steps.

What to watch in the coming months​

  • OEM advisories and firmware release schedules — model‑level guidance will determine which devices need manual firmware updates and when those updates will be published.
  • Microsoft rollout telemetry and guidance changes — watch for updated KB notes and expanded tooling for diagnostics and bulk enrollment.
  • Reports of regressions or compatibility breaks — even with gating, isolated regressions can affect specific peripherals, option ROMs, or anti‑cheat systems. Test widely.
  • Communication from anti‑cheat and virtualization vendors about compatibility with new signing chains — ensure gaming and integrity stacks are validated against the UEFI CA changes.

Final analysis — what this means for Windows security​

This certificate refresh is preventive maintenance at the root of system trust: it’s not a feature update or a bugfix; it’s a necessary renewal of the cryptographic anchors that Secure Boot — and by extension many of Windows’s pre‑boot security controls — depend upon. Microsoft’s combination of OS‑driven enrollment, firmware updates, and gating logic shows an awareness of the firmware ecosystem’s fragility and the practical need to avoid blunt‑force mass firmware writes.
That said, success depends on coordination. The plan will protect the majority of modern, update‑friendly endpoints, but it also creates a set of residual operational tasks: OEM firmware harmonization, recovery image updates, and manual remediation for air‑gapped or telemetry‑restricted systems. Administrators who delay or ignore the work risk a loss of pre‑boot updateability, compatibility headaches, and avoidable BitLocker incidents.
For most users the practical takeaway is simple and immediate: keep Windows Update on, install cumulative updates (especially the early 2026 packages), and apply OEM firmware updates when available. For administrators, treat the rollout as a scheduled infrastructure task — inventory, pilot, coordinate with vendors, and update recovery artifacts.
In a security‑minded ecosystem, renewing trust anchors is unavoidable. Microsoft’s 2023 CA family and its careful, phased delivery represents a sound technical approach — but the remaining work falls to OEMs, admins, and device owners to execute. If you act now, the change should be invisible; if you don’t, it may become a visible and painful operational problem later in 2026.

Source: Windows Central Microsoft warns Secure Boot certificates will expire soon — what to expect
Source: theverge.com Microsoft is keeping Secure Boot alive with Windows updates
Source: Tom's Hardware Microsoft is refreshing Secure Boot certificates to plug security holes before they happen — if you bought a PC last year, you should be set
Source: XDA Microsoft is giving Secure Boot a 15-year refresh, so update your PC to stay safe
Source: Engadget Microsoft will start refreshing Secure Boot certificates in March for Windows 11 and Windows 10 ESU users
 

Microsoft’s warning is short and stark: the Secure Boot certificates that have protected Windows boot chains since 2011 begin expiring in mid‑2026, and while most PCs will receive replacement certificates automatically, a significant minority of systems — especially managed, offline, or firmware‑outdated devices — will need intervention from IT teams or OEM firmware updates to avoid a progressive loss of early‑boot defenses.

A futuristic Secure Boot screen shows KEK/DBX Keys as a gloved hand inserts a USB device into a motherboard.Background / Overview​

Secure Boot is a UEFI firmware feature that enforces a cryptographic chain of trust for pre‑OS components: firmware option ROMs, EFI applications, the Windows Boot Manager, and ultimately the kernel. Since 2012 Microsoft supplied a standardized set of Microsoft CA certificates (commonly referred to as the 2011 CAs) in the UEFI Secure Boot databases (PK/KEK/DB/DBX). Those CA certificates begin to expire in June 2026 and some finish expiring by October 2026.
To address that expiration Microsoft and OEM partners created a set of 2023 certificates and have been rolling them out in two ways: (1) preinstalled in firmware on new devices shipped since 2024, and (2) delivered to many existing devices via Windows cumulative updates and a controlled, phased injection process. Microsoft’s support guidance—aimed at both home users and IT professionals—says that devices without the new certificates will continue to boot and run normally, but they will no longer be able to receive new boot‑level security protections signed by Microsoft, including updated revocation lists and boot manager fixes.
This article explains what is changing, why it matters, who is affected, and — most importantly for Windows administrators and power users — what to do now to ensure continuity of Secure Boot protections across fleets and individual PCs.

What exactly is expiring, and what replaces it?​

The expiring items​

  • Three Microsoft certificate authorities in firmware commonly used by Windows Secure Boot began as the Microsoft Corporation KEK CA 2011, Microsoft Windows Production PCA 2011, and Microsoft Corporation UEFI CA 2011.
  • These certificates are stored in UEFI variables: KEK (Key Exchange Key), DB (signature allowlist), and DBX (revocation list).
  • The expiration window begins June 2026; some entries expire by October 2026.

The replacements and why they’re different​

Microsoft issued a set of 2023 certificates that will replace (or supplement) the 2011 CAs. Important design notes:
  • The KEK replacement is named Microsoft Corporation KEK 2K CA 2023 (used to sign updates to DB and DBX).
  • The Windows boot loader signing CA is now Windows UEFI CA 2023 and is stored in the DB.
  • The original single UEFI CA was split into two 2023 certificates — Microsoft UEFI CA 2023 (for EFI apps and third‑party boot loaders) and Microsoft Option ROM UEFI CA 2023 (for signed option ROMs). That split gives OEMs and administrators finer control over trusting option ROMs separately from boot loaders.
This separation is purposeful: it reduces blast radius and allows administrators and OEM firmware to limit trust expansion to only the component classes they intend to allow.

What changes in practice: immediate and long‑term impacts​

What continues to work (short term)​

  • Devices will still start and operate normally if they reach the old certificate expiration dates without receiving the new certs.
  • Standard Windows updates unrelated to early boot components will continue to install.
  • Everyday apps, networking, browsing, and most OS features remain unchanged.

What will be blocked or unavailable​

  • Devices without the 2023 certs will not be able to receive new Secure Boot or early‑boot security protections — this includes new Windows Boot Manager updates, DB/DBX updates (revocations), and fixes for newly discovered boot‑level vulnerabilities.
  • Over time a device missing the updated certificates will be in a progressively degraded security state against new bootkits or pre‑OS tampering.
  • Some third‑party components that explicitly rely on Microsoft’s Secure Boot trust (for example, certain anti‑cheat drivers or vendor‑signed option ROMs) may fail to update or be trusted if they are signed only under the 2023 CAs.

Security ramifications​

  • Without the ability to install new DBX revocations or Boot Manager patches, devices become blind to newly discovered boot‑level threats.
  • Features that rely on Secure Boot hardening — notably certain BitLocker protections that assume an intact pre‑boot chain — may be weakened if Microsoft cannot push mitigations or if OEMs cannot provide firmware fixes.
  • For enterprises, failing compliance scans that check for up‑to‑date Secure Boot certs may occur if audits require 2023 CAs to be present.

How the updates are being delivered​

Microsoft and OEMs are using a hybrid approach:
  • Automatic Windows Update injection. For many consumer and enterprise clients, updates delivered via cumulative updates (LCUs) can set a device into a controlled rollout that triggers UEFI variable changes to add the 2023 certs. Microsoft has built a phased rollout model that only applies changes to devices that demonstrate update stability to reduce the risk of widespread failures.
  • OEM firmware (BIOS/UEFI) updates. Many OEMs began shipping firmware with the 2023 certs and have BIOS updates for older models that add the certificates directly into the default firmware DB. Vendors such as Dell and ASUS have guidance and firmware releases to assist devices that cannot be updated purely via Windows Update.
  • Manual or managed deployment. For air‑gapped or tightly controlled environments (WSUS, offline systems, or specialized IoT/embedded gear), administrators must manually approve and deploy the Microsoft packages or use OEM tools to inject keys into firmware.
Note: Some Microsoft update packages include the new certificates (Microsoft documentation references LCUs dating back to mid‑2025 that carry the objects), but injecting those objects into firmware variables requires either a Windows platform assisted process or OEM firmware support. In short: having the package installed is not always the same as successfully injecting the certs into UEFI variables.

Who is at risk — and who can sit back and wait?​

  • Most consumer Windows 11 desktops and laptops with default Windows Update enabled and reasonably current firmware will receive the new certs without end‑user action.
  • Older systems, custom builds, and many enterprise fleets may still be reliant on OEM BIOS updates or an IT‑managed deployment to stay current.
  • Virtual machines and hosted environments may need special handling; Microsoft guidance flags Hyper‑V VMs and virtualized platforms for potential issues during deployment.
  • Air‑gapped systems managed via WSUS or Configuration Manager require explicit approval of update packages; they will not receive automatic, Microsoft‑initiated firmware changes without administrator action.
  • Devices that have Secure Boot disabled are unaffected by the certificate change (they already bypass Secure Boot checks), but they are also not receiving the protections Secure Boot provides.

Practical checklist: what you should do now​

Follow this prioritized checklist to reduce risk and avoid disruption.
  • Inventory and triage
  • Identify devices with Secure Boot enabled. Use the System Information GUI (Secure Boot State) or PowerShell: run Confirm‑SecureBootUEFI (elevated) to return True/False.
  • For large fleets, deploy scripts (Intune or SCCM/ConfigMgr) that check Secure Boot state and firmware dates.
  • Verify certificate presence
  • On representative systems run PowerShell checks to look into the active DB and KEK. Example approaches include Get‑SecureBootUEFI (inspect DB bytes for the string Windows UEFI CA 2023) or vendor‑recommended one‑liners to detect the presence of 2023 cert entries.
  • If you see the 2023 labels in DB or KEK, the device has the updated certs injected.
  • Patch and firmware strategy
  • Ensure Windows cumulative updates issued since mid‑2025 or later are installed (these contain the certificate payloads used by Microsoft’s update assists).
  • Confirm firmware (UEFI/BIOS) is updated to vendor-recommended builds that include the 2023 certs. OEM announcements from major vendors indicate they shipped updates through 2024–2025 and will continue support.
  • Plan for BitLocker
  • BIOS/UEFI updates can trigger BitLocker recovery prompts. Before applying firmware updates, suspend BitLocker or decrypt in accordance with your org’s change control, then re-enable after updates complete.
  • Special cases and remediation
  • If a device won’t receive certs automatically (older firmware or unsupported hardware), obtain an OEM BIOS update or use Microsoft’s documented assisted/manual deployment packages.
  • For WSUS/air‑gapped networks, approve and distribute the necessary update packages and monitor for successful UEFI injections.
  • Test and monitor
  • Stage installs in lab environments that reflect production hardware. Pay attention to known issues previously tied to certain cumulative updates (some updates have caused device instability on particular driver/OEM combinations).
  • Monitor Event Logs and Microsoft telemetry guidance for deployment events and failures (Microsoft published guidance includes remediation playbooks and scripts).

Verifying success: concrete commands and indicators​

  • Confirm Secure Boot is enabled:
  • Run an elevated PowerShell session and execute: Confirm‑SecureBootUEFI. A return of True confirms Secure Boot is ON.
  • Inspect the Secure Boot databases:
  • Get‑SecureBootUEFI db prints the active DB bytes; many vendors supply a short script to search those bytes for the string "Windows UEFI CA 2023" or the OEM label for the KEK.
  • Vendor guidance:
  • OEM knowledge base articles (Dell, ASUS and others) publish tested PowerShell snippets that check for presence of the 2011 vs 2023 certificates; use those as a reliable cross‑check.
If verification fails on an endpoint, escalate to firmware update, a manual key enrollment provided by Microsoft/OEM, or contact the OEM for remediation.

Real‑world complexity: where things can go wrong​

  • Firmware limitations: Older UEFI implementations may not accept automated db/dbx/KEK injections. Those devices require an OEM BIOS update, and if OEM support is discontinued, the device could be left unpatchable for boot‑level protections.
  • BitLocker recovery: Updating firmware often changes the measured boot values; BitLocker can trigger recovery mode if steps (suspending BitLocker) aren’t taken beforehand. This is a frequent source of support calls during mass BIOS updates.
  • Controlled rollout and update side effects: Microsoft’s phased injection uses telemetry and stability gating to reduce risk. Nevertheless, large cumulative updates (e.g., KB5074109 from January 2026) have previously been associated with driver and performance regressions on certain configurations. That reality means testing and staged rollout are essential.
  • Managed environments and WSUS: Devices that don’t get the update automatically — WSUS‑only machines, closed networks, or those with disabled telemetry — will require extra administrative effort to import and stage the cert packages.
  • Virtual machines and nested/hypervisor scenarios: Hyper‑V hosted VMs or platforms that don’t expose UEFI variable support in the guest may fail to accept injections automatically. Microsoft documentation calls out VM scenarios as requiring special handling.

Strengths of Microsoft’s approach — and where it falls short​

Strengths​

  • Proactive lifecycle management — Microsoft created a generational refresh rather than letting millions of devices silently lose the ability to be updated.
  • Phased, telemetry‑guided deployment — rolling updates only to devices showing healthy update behavior reduces systemic risk.
  • OEM coordination — major OEMs are distributing firmware that contains the 2023 certs, which minimizes the need for risky in‑OS injections on some devices.
  • Granular trust model — splitting UEFI CA duties into separate certs for boot loaders and option ROMs reduces attack surface and gives administrators finer control.

Gaps and risks​

  • Dependency on OEM firmware support. Devices out of OEM support or with poor UEFI implementations could be stranded without a path to receive new certs.
  • Operational friction for managed fleets. WSUS, air‑gapped, or highly regulated environments require manual work and proof‑of‑state; Microsoft’s assists aren’t a substitute for administrators’ responsibilities.
  • Potential for disruptive side effects. Historic evidence from recent cumulative updates shows that large platform updates can expose driver or hardware incompatibilities that need careful testing.
  • Communication clarity. While Microsoft published guidance and IT playbooks, the multi‑part nature of the change (OS packages, UEFI variables, OEM BIOS changes, BitLocker interactions) means end users and even some IT teams may misunderstand what “applied” actually means.

Risk scenarios to plan for (attack stories that matter)​

  • Scenario: An older but otherwise healthy endpoint misses the 2023 cert injection and later a new boot‑level exploit is discovered. Microsoft issues a DBX revocation to block malicious loaders, but that endpoint cannot receive the revocation because its KEK/DB entries are expired — the device remains susceptible.
  • Scenario: An enterprise with WSUS‑only clients assumes installing the cumulative update equals success. A subset of devices has firmware that rejects the injected objects; they continue to appear compliant in patch management but are not actually receiving the new CA entries — a dangerous false positive in compliance reporting.
  • Scenario: A mass firmware push across thousands of machines triggers BitLocker recovery prompts because suspending BitLocker wasn’t executed in tandem. Operationally this creates helpdesk overload and downtime.
These are not theoretical: companies and OEMs have already documented practical remediation steps and real incidents arising from platform updates in 2025–2026, underscoring the need for careful change control.

Recommendations: a minimal policy for IT teams​

  • Start now (do not wait for June 2026). Prioritize hardware that:
  • Has Secure Boot enabled.
  • Lacks recent firmware updates (older than 2022).
  • Is managed by WSUS with suppressed or delayed updates.
  • Create a three‑tier deployment plan:
  • Pilot: Test across representative hardware models and VM types; validate DB/KEK entries after updates and perform BitLocker suspend‑resume workflows.
  • Phased production: Roll out by hardware family and criticality, monitoring event logs and update telemetry.
  • Remediate: List devices where automatic injection fails and plan OEM BIOS updates or manual remediation steps.
  • Update and document BitLocker management processes: suspension, recovery key inventory, and safe re‑enabling.
  • Communicate with end users: explain that firmware updates or BitLocker prompts may occur and provide recovery instructions and timelines.
  • For air‑gapped or regulated networks: allocate approvals and testing cycles now to import Microsoft’s assisted packages into WSUS or the appropriate management pipeline.

Final assessment: urgency without panic​

The Secure Boot certificate refresh is an important, time‑sensitive infrastructure maintenance event. It’s not an emergency that will suddenly brick consumer PCs the moment a date ticks over; Microsoft’s own guidance makes it clear devices will still boot. But the core point is this: without the 2023 certificates, devices lose the ability to accept future boot‑level protections. That is a substantial long‑term security degradation that becomes more serious as new boot‑level vulnerabilities and bootkits surface.
For most modern Windows devices with current firmware and default Windows Update settings, the risk is low if routine updates are allowed to proceed. For enterprises, managed fleets, legacy hardware, and air‑gapped systems, the risk is real and measurable — and it requires concrete action: inventory, test, patch firmware, and verify the certificates are present in the UEFI databases before June 2026.
Takeaway: treat this like a hardware‑plus‑firmware patching cycle with the same discipline you would apply to BIOS/UEFI rollouts or mass firmware updates. Plan, test, and verify — and don’t assume that installing a Windows package is the same as securing the device’s pre‑boot trust chain.

Conclusion
The Secure Boot certificate expiration and replacement is a deliberate, necessary maintenance of the foundational trust chain that protects Windows devices at boot. Microsoft and OEMs have supplied the technical changes and distribution paths, but the on‑the‑ground work of validating firmware compatibility, staging rollouts, and handling BitLocker interactions falls to administrators and vendors. Start your inventory and pilot work now; verify the presence of the Windows UEFI CA 2023 and related entries on representative systems; and treat any firmware updates as a coordinated change that includes BitLocker and recovery planning. Doing so will keep devices receiving the earliest‑stage protections that are increasingly critical in an era of sophisticated firmware and bootkits.

Source: Microsoft Support When Secure Boot certificates expire on Windows devices - Microsoft Support
 

Secure Boot’s root certificates are getting a generational refresh — and the Windows ecosystem is executing one of the largest coordinated certificate rollouts in recent memory to ensure PCs keep a trusted boot chain well past June 2026. This update is not an optional security nicety: it replaces aging cryptographic anchors introduced in 2011, installs new Microsoft-signed CA certificates created in 2023, and positions firmware, OS, and management tooling to continue receiving boot‑level protections for years to come.

Neon UEFI firmware screen displaying Secure Boot keys (PK, KEK, db, dbx) over a motherboard.Background: why Secure Boot certificates matter​

Secure Boot is a firmware‑level trust mechanism defined by the UEFI standard that prevents unsigned or untrusted boot components from running during the earliest stage of system startup. The firmware enforces trust by maintaining a small set of cryptographic artifacts — the Platform Key (PK), Key Exchange Keys (KEK), the allowed signatures database (db), and the revoked signatures database (dbx). Together these elements create the root of trust for the platform’s boot path, enabling the firmware to verify bootloaders, hypervisors, and other pre‑OS components before control passes to Windows or any other operating system.
When those cryptographic anchors age or expire, the firmware can still boot, but it cannot confidently accept new or updated boot‑level signatures signed with a fresh CA. Over time that blocks deployment of mitigations for newly discovered boot vulnerabilities and reduces the platform’s capacity to trust newer signed components. The practical consequence: systems that miss the certificate refresh will continue to run, but they enter a degraded security state that undermines future hardening and may create compatibility problems with evolving firmware and OS features.

What Microsoft, OEMs and the UEFI ecosystem are doing​

The buildout to replace the 2011 Microsoft Secure Boot certificates with updated 2023 CAs is a multi‑pronged effort. Microsoft has published guidance and support updates that explain what certificates are expiring, the replacement certificates (for example, the Microsoft KEK CA from 2011 is replaced by Microsoft Corporation KEK 2K CA 2023), and the phased deployment plan that uses Windows monthly quality updates to deliver the new certs to devices that are ready.
Device manufacturers (OEMs) have played — and continue to play — a central role. Newer PCs shipped since 2024 and a large share of 2025 models already include the updated certificates in their firmware image, which means most modern systems will require no action from their owners. For in‑market devices, OEM firmware updates and collaboration with Microsoft were required to ensure that the new keys can be safely enrolled into a device’s UEFI database without breaking boot integrity. Major OEMs have publicly described coordinated work with Microsoft to validate firmware behavior across enterprise, consumer, and edge scenarios.
Microsoft is also modifying the Windows servicing pipeline to perform this rollout carefully: updates that contain certificate enrollment logic are targeted only to devices that demonstrate “sufficient successful update signals,” a risk‑reduction mechanism added in January 2026 to ensure a staged deployment and allow rollback or hold conditions when unusual telemetry patterns appear. The initial carrier for this logic was the January 13, 2026 cumulative update for Windows 11 (KB5074109), which includes the device‑eligibility checks and rollout controls.

The timeline and what “expiration” actually means​

  • The original Microsoft Secure Boot certificates introduced around 2011 begin expiring in late June 2026. Devices that still rely only on those 2011 certificates are the ones at risk of losing the ability to accept future boot‑level security updates.
  • New Microsoft CA certificates were issued in 2023 and have been used on new hardware since 2024; Microsoft’s plan is to add those CAs to in‑market devices through Windows Update (and, where necessary, through OEM firmware updates) well in advance of the expiration window.
  • Windows 10 reached end of mainstream support on October 14, 2025; machines running Windows 10 that are not enrolled in Extended Security Updates (ESU) will not receive the automatic certificate deployment through standard Windows Update. Administrators should treat Windows 10 endpoints differently when planning remediation.
It’s critical to stress the behavior: expiration of the 2011 certificates does not instantly “brick” a PC. Systems will boot and existing signed software will continue to execute, but the platform loses the ability to trust and install new Secure Boot updates, which means future mitigations and updates to the boot components may not be applied. In other words, expiration creates a forward‑looking risk profile rather than an immediate outage.

Technical primer: PK, KEK, db and dbx — what changes and why​

To plan or audit this transition, IT teams must understand the key stores involved:
  • Platform Key (PK): The device owner’s root key for the platform. It’s the highest authority on a device and is typically provisioned by the OEM. Changes to the PK are rare and deliberate.
  • Key Exchange Keys (KEK): Used by signers like Microsoft to authorize updates to the db and dbx. The 2011 KEKs are being replaced by updated KEKs issued in 2023 so that Microsoft‑signed updates to db/dbx remain verifiable after 2011 keys expire.
  • db: The allowed signatures and certificates database; new trustworthy bootloaders and drivers are placed here.
  • dbx: The revoked signatures database; Microsoft and others update dbx to block known‑bad binaries and compromised signing certs.
By rotating the KEK and relevant db entries, Microsoft ensures it can continue to publish revocations and updates to db/dbx while maintaining continuity with OEM‑installed PKs. The UEFI Forum and industry tooling also lean on the same files (db/dbx manifests and revocation lists) used by firmware update services to keep devices in sync.

What admins and users should check right now​

For most consumer and business devices that allow Windows to manage updates, Microsoft’s strategy is to install the new certificates automatically via Windows Update. However, administrators should actively validate readiness and prepare remediation paths for the minority of systems that will not auto‑enroll:
  • Verify Secure Boot is enabled:
  • GUI: Settings > Privacy & Security > Windows Security > Device Security.
  • PowerShell (elevated): run Confirm-SecureBootUEFI and expect True for enabled systems.
  • Check whether the 2023 CA is present in the UEFI db:
  • Example PowerShell check (run as admin): [System.Text.Encoding]::ASCII.GetString((Get-SecureBootUEFI db).bytes) -match 'Windows UEFI CA 2023'
  • A True response indicates the updated CA is present. If False, the device likely still relies on older certs and needs remediation. (Third‑party how‑to guidance and Microsoft documents illustrate these commands).
  • Ensure devices are on current Windows monthly updates and that their diagnostic telemetry is enabled to the level Microsoft requires for the targeted rollout path. Where Windows Update will not automatically push the certs (for example certain server or IoT flows), inventory and management systems should be prepared to deliver firmware patches and the enrollment updates.
  • For devices with BitLocker enabled: temporarily suspend BitLocker prior to firmware operations or key enrollment where recommended by OEM guidance, to avoid unintended recovery prompts during firmware writes. Several community‑facing how‑tos and OEM advisories flag this as a common gotcha.

Step‑by‑step playbook for IT administrators​

Below is a pragmatic, prioritized sequence to prepare a fleet and minimize support incidents.
  • Inventory
  • Export a list of devices including model, firmware version, OS version, Secure Boot status, and whether devices are managed by Windows Update or a third‑party update channel.
  • Validate
  • Run remote PowerShell or a managed compliance script (Intune, SCCM, other MDM) to check for the presence of the 2023 CA in the db and confirm Secure Boot is enabled.
  • Patch firmware
  • For models that report missing CA support, coordinate with OEM firmware updates. Apply firmware updates in test rings before broad deployment.
  • Control rollout
  • Use Microsoft’s staged servicing and eligibility signals where available; if your management tooling allows, create phased deployments and monitor Event Logs for Secure Boot‑related entries and enrollment errors.
  • Remediate
  • For devices that fail to accept the new certs, follow OEM troubleshooting: update firmware, suspend BitLocker if needed, or perform the manufacturer‑recommended enrollment toolchain.
  • Communicate
  • Notify affected users in advance if firmware updates are required; document procedures for helpdesk staff and create a recovery runbook for TPM/BitLocker recovery scenarios.
Microsoft offers an IT playbook and guidance for enterprise deployments that covers verification, monitoring, and remediation steps; organizations should adopt those materials into their patch management standard operating procedures.

Risks, edge cases, and what to watch for​

Even well‑planned transitions encounter friction. Below are the notable risks and how to mitigate them.
  • Firmware that cannot accept the new CA: Older or poorly maintained firmwares may lack the code paths to write the replacement certificates into the KEK/db store. Mitigation: identify those models and apply OEM firmware or retire unsupported hardware.
  • BitLocker recovery prompts: Firmware writes and key rotations can change measured boot states, triggering BitLocker recovery if not suspended. Mitigation: suspend BitLocker before applying firmware/key enrollment and resume after successful boot validation.
  • Devices out of Windows Update scope: Servers, specialized IoT devices, and machines running unsupported Windows versions (notably Windows 10 outside ESU) may not receive the automatic enrollment; these require bespoke processes. Mitigation: create inventory of such systems and plan firmware-enrollment windows with OEM guidance.
  • Rollout telemetry and targeting surprises: Microsoft’s staged approach relies on update‑health telemetry to decide eligibility. Organizations with tight privacy settings or blocked telemetry channels may need to use manual deployment paths. Mitigation: coordinate with update controls and use the Microsoft IT playbook’s automated deployment assists when eligible.
  • Unverified third‑party guidance: Community scripts and blogs offer helpful checks, but scripts that write UEFI variables can be dangerous if used incorrectly. Mitigation: follow OEM and Microsoft published guidance first and test any community tools in an isolated lab.

Why certificate rotation is the right move — and when it becomes risky​

Cryptographic best practice requires periodic key and certificate rotation. Keys that are static for a decade increase the probability of compromise or weaken security assumptions as cryptographic algorithms evolve. By creating a new KEK and db entries, the ecosystem extends the ability to sign and deliver Secure Boot db/dbx updates, enabling mitigation of newly discovered bootkits and firmware malware. This is standard public‑key lifecycle hygiene and aligned with industry practice.
That said, certificate rotations at the firmware level are not routine maintenance — they touch the platform's root of trust and must be conducted with considerable testing, telemetry control, and OEM coordination. The risk is not the rotation itself but the diversity of firmware states in the field, the number of legacy devices, and the operational complexity of rolling a cryptographic anchor across millions of SKUs. The current rollout demonstrates both the scale of the challenge and the feasibility of doing it carefully when the OS vendor, firmware vendors, and OEMs coordinate closely.

Real‑world signals and media coverage​

Independent technology outlets and security researchers have tracked the rollout and highlighted practical tips for end users and administrators. Coverage emphasizes that the January 2026 Windows update (KB5074109) added the enrollment logic and started the staged deployment, while community voices have published PowerShell checks administrators can use to assert certificate presence. The consensus from independent reporting is consistent with Microsoft’s guidance: start inventory and remediation efforts now rather than after the 2011 certs begin expiring in June 2026.

Recommendations: short list for immediate action​

  • For small businesses and consumers:
  • Keep Windows Update active and install monthly quality updates.
  • Check Secure Boot status in Windows Security and, if comfortable, run the documented PowerShell checks to confirm the 2023 CA presence.
  • For enterprise IT:
  • Perform a rapid inventory to identify devices with missing 2023 certificates or firmware older than vendor‑recommended levels.
  • Test OEM firmware updates in small rings; suspend BitLocker where required and ensure recovery keys are accessible.
  • Use Microsoft’s IT playbook and management tooling to orchestrate phased deployments and monitor Event Logs for Secure Boot enrollment events.
  • For organizations running Windows 10:
  • Identify which devices are enrolled in Extended Security Updates (ESU). Devices not enrolled will not receive automatic certificate updates from standard Windows Update and require manual mitigation or hardware replacement planning.

Looking further ahead: maintaining a healthy boot trust model​

This certificate refresh should be seen as the start of an ongoing lifecycle discipline. OS and firmware vendors — alongside hardware manufacturers — must maintain regular key‑rotation programs, transparent timelines, and operator‑friendly tooling for enrollment and revocation of certificates. The UEFI community’s move toward centralizing revocation lists and dbx management (and the tooling that enables online updates to dbx using vendor services) is a positive development, reducing ad‑hoc vendor differences and making future rotations smoother.
Organizations should formalize boot‑chain health in their security operations playbooks the same way they manage patching, endpoint protection, and identity: treat Secure Boot artifacts as critical assets, track firmware health and revocation lists, and integrate boot‑level telemetry into incident response plans.

Final assessment: risk vs. reward​

Rotating Secure Boot certificates is fundamentally a security‑positive action — it preserves the platform’s ability to receive boot‑level mitigations, supports trust for future hardware and OS developments, and aligns Windows‑ecosystem devices with modern cryptographic hygiene. The risks are operational: devices that fail to enroll require manual OEM firmware intervention, and poorly managed rollouts can trigger user‑facing issues such as BitLocker recovery prompts.
The rollout’s cautious design — staged eligibility signals, OEM pre‑provisioning on new hardware, and the ability for organizations to manage the enrollment process — is the correct tradeoff between safety and speed. The decisive action for IT teams is simple: inventory, validate, apply firmware and Windows updates in test rings, and then scale. For consumers, the message is equally direct: keep your PC updated and consult your OEM if the device shows firmware or Secure Boot anomalies.
Secure Boot’s certificates anchor trust from the first instruction the CPU executes. Refreshing that anchor is uncomfortable because it touches the lowest layers of a PC, but it is necessary. Done carefully, the industry’s coordinated update will extend protection for the next generation of firmware, firmware‑based mitigations, and Windows features — and keep the “first line” of system integrity strong for years to come.

Source: Microsoft - Message Center Refreshing the root of trust: industry collaboration on Secure Boot certificate updates
 

Microsoft is preparing a quiet but critical update to the foundation of Windows platform security: the Secure Boot certificates that firmware uses to validate every component that runs before the operating system. Those original Microsoft certificates issued in 2011 begin to expire in mid‑2026, and Microsoft is rolling out a set of replacement 2023 Secure Boot certificates via Windows Update and coordinated OEM firmware updates so older PCs can continue to trust modern boot code and receive future mitigations for boot‑level threats.

A gloved hand with a stylus projects a neon Secure Boot shield over a motherboard.Background​

Secure Boot was introduced as part of the UEFI standard and made a core part of Windows security starting with Windows 8. The mechanism prevents unsigned or tampered pre‑OS code—bootloaders, option ROMs, firmware drivers, and other EFI applications—from running during system start. It does that by maintaining a set of cryptographic trusts in firmware: the KEK (Key Exchange Key), DB (allow list), and DBX (revoked signatures), which rely on certificates issued by trusted Certificate Authorities (CAs).
The specific Microsoft certificates that thousands of Windows‑based devices have relied on since 2011 are now approaching their expiry window. Microsoft issued new certificate authorities in 2023 to replace the expiring 2011 roots, and beginning in 2024 OEMs started shipping newer devices preloaded with the 2023 certs. For older systems, Microsoft’s approach is a mix of automated Windows Update delivery and OEM firmware updates so devices are refreshed before certificate expiry begins in June 2026.
This change is not cosmetic. When Secure Boot certificates expire and are not updated, devices will continue to boot, but they enter a degraded security state: future boot manager updates, Secure Boot database updates, and in‑firmware revocations cannot be trusted or applied. Over time, that will widen an attack surface for boot‑level attacks and can create compatibility problems for new OS builds, drivers, anti‑cheat systems, or virtualization features that rely on Secure Boot trust.

What Microsoft is doing and how it will be delivered​

Microsoft’s plan is deliberately layered and collaborative with OEMs and IT partners. The key elements are:
  • Microsoft issued new 2023 Secure Boot certificates to replace the 2011 CAs; these split some functionality (for example, separate signing for bootloaders and option ROMs) to give finer control over what is trusted.
  • The 2023 certs have been included in Windows cumulative updates and platform updates distributed since 2024 and 2025, but pushing the certificates into device firmware requires either:
  • Microsoft‑managed deployment via Windows Update (where Windows writes new variables into UEFI for eligible devices), or
  • A firmware update from the OEM that ships the new certs in the firmware itself.
  • Microsoft is prioritizing an automatic, staged rollout for most consumer and business devices that use Microsoft‑managed updates. Devices that have reliably reported diagnostic data and meet other eligibility signals will be prioritized in the controlled rollout.
  • Some devices will require an OEM firmware update before the Windows Update component can apply the new certs. OEMs have been provisioning new devices shipped since 2024 — and the majority of systems shipped in 2025 already include the 2023 certificates.
Microsoft’s guidance stresses that the update is an “assist” for many devices but not a guarantee. IT administrators remain responsible for validating their fleet, coordinating firmware updates, and ensuring devices on unsupported Windows versions have a supported path (for example, Windows 10 devices on Extended Security Updates).

Why this matters: the technical and security implications​

Secure Boot is passive and silent until something goes wrong. Its impact is primarily preventative, which means the vulnerability surface grows slowly but materially when cryptographic roots age.

How certificates are used​

  • KEK (Key Exchange Key): governs who can update Secure Boot databases (DB/DBX).
  • DB (Allow list): contains trusted keys and signatures for boot components.
  • DBX (Revocation list): lists signatures that should no longer be trusted.
When Microsoft signs a new Windows Boot Manager, a driver, or issues a revocation, the firmware must be able to validate those signatures against an unexpired CA. If the CA itself expires, new signatures and revocations cannot be validated by that certificate chain.

Immediate impacts of not updating​

  • The device will still boot and function, but it will no longer receive future Secure Boot‑related security fixes.
  • Devices will be unable to trust newly signed boot software that uses the new CA, leading to compatibility problems when updating OS components, drivers, or third‑party firmware modules.
  • Over time, the inability to apply revocations and mitigations means boot‑level attacks (bootkits, early firmware rootkits) become harder to mitigate on those systems.

Broader ecosystem impacts​

  • Anti‑cheat and game protection systems often rely on Secure Boot and signed early‑boot components. These systems may expect modern certificate lifecycles and could behave differently on systems with expired certs.
  • Linux and dual‑boot setups: many Linux distributions rely on a Microsoft‑signed shim to chain into their own boot loaders on Secure Boot systems. A change in root certificates, or a device that doesn’t get updated, could lead to unexpected failures unless the distro or the user has coordinated with the new signing chain.
  • Enterprise infrastructure: air‑gapped or highly‑restricted fleets (manufacturing controllers, some servers, OT equipment) that do not expose diagnostic data to Microsoft will likely require manual firmware updates or an internally managed process to push the new certificates.

What this means for different user groups​

Home users and consumers​

Most consumer PCs that receive automatic Windows Update will get the 2023 certificates without user action. For these users the best practices are straightforward:
  • Keep Windows Update enabled and install recommended cumulative updates.
  • Verify Secure Boot is enabled in UEFI — devices with Secure Boot disabled will not receive certificate updates via Microsoft’s process.
  • Check your PC manufacturer’s support page for firmware updates if Windows Update reports that firmware is required.
Practical heads‑up: firmware updates can sometimes trigger BitLocker recovery prompts. Make sure your BitLocker recovery key is backed up before applying BIOS/UEFI updates or toggling Secure Boot.

Small business and IT administrators​

IT teams should treat the Secure Boot certificate refresh as a planned change that intersects with firmware management, update rings, and compliance reporting.
  • Inventory which devices have Secure Boot enabled and which firmware versions they run.
  • Validate that Windows Update servicing channels and telemetry settings allow Microsoft‑managed rollouts where appropriate.
  • Apply OEM firmware updates through your managed update pipeline (WSUS, SCCM, Intune) before or alongside the Windows Update rollout.
  • For devices that cannot be managed by Microsoft or that are air‑gapped, follow OEM guidance and Microsoft’s provided playbook to push updates manually.

Organizations with air‑gapped, server, or specialist devices​

These environments will not benefit from Microsoft’s broad managed rollout. The playbook and guidance are explicit: coordinate directly with OEMs, validate firmware updates in staging, and plan for a manual variable update process. Failure to act can leave critical infrastructure unable to accept future Secure Boot mitigations.

Windows 10 users and Extended Security Updates (ESU)​

Windows 10 mainstream support ended in October 2025. Microsoft’s position: devices running unsupported Windows 10 versions will not receive the new certificates unless enrolled in the Windows 10 Extended Security Updates (ESU) program. If your organization is on ESU, it will still be eligible to receive the Secure Boot certificate updates through that program.

Risks, edge cases, and compatibility concerns​

This rollout is low‑impact for most users, but the devil is in the details. Here are the notable risks and nuanced edge cases to track:
  • Firmware prerequisites: a small but meaningful fraction of devices require a specific OEM firmware update before Windows can write the new Secure Boot variables. Failing to apply firmware first can block certificate application.
  • BitLocker interruptions: firmware rewrites and boot variable changes can trigger BitLocker recovery. Back up recovery keys and consider suspending BitLocker before firmware operations where recommended.
  • Devices with Secure Boot disabled: these systems won’t be assisted by Microsoft and remain vulnerable to boot‑level threats. Re‑enable Secure Boot only after reviewing compatibility (some older hardware and drivers are incompatible).
  • Third‑party bootloaders and niche drivers: custom or community‑signed boot software may need re‑signing against the new CA chain; this is especially relevant in developer, gaming, or test labs that load unsigned callouts.
  • Virtual machines: Secure Boot for VMs is mediated by hypervisors. Ensure hypervisor platforms and guest configuration are aware of the certificate rollovers; some hypervisor vendors may need to refresh the Secure Boot variables used for guests.
  • Regulatory and compliance audits: organizations that must demonstrate tamper‑resistance and timely patching should document their Secure Boot certificate update path to avoid future compliance gaps.
  • Air‑gapped or privacy‑sensitive environments: Microsoft’s staged rollout relies on diagnostic telemetry to prioritize devices. If you decide not to share telemetry, you must treat the update as an operational task that IT is responsible for executing manually.

Step‑by‑step checklist for users and admins​

Follow these steps to avoid surprises and keep systems protected:
  • Verify Secure Boot status:
  • Open System Information (msinfo32) and check Secure Boot State. If it reads On, the device is eligible for managed updates.
  • Confirm Windows is supported:
  • Ensure the device runs a supported version of Windows 11 or Windows 10 on ESU.
  • Keep Windows Update enabled:
  • Accept recommended cumulative updates; Microsoft will stage the rollout for devices that meet eligibility criteria.
  • Check OEM support and firmware:
  • Visit the PC manufacturer’s support page for BIOS/UEFI updates and installation notes. Apply firmware updates before the certificate update if instructed.
  • Back up BitLocker recovery keys:
  • Export and store BitLocker recovery keys to a secure location before firmware or boot variable changes.
  • For enterprises: test first, deploy selectively:
  • Stage updates in a pilot ring. Use WSUS, SCCM, Intune or another tool to schedule firmware and certificate updates. Monitor post‑install behavior closely.
  • For air‑gapped systems: follow the Secure Boot playbook:
  • Use Microsoft’s provided playbooks and OEM guidance to manually update variables safely.

What to watch for in the coming months​

  • Microsoft’s staged rollout will continue through mid‑2026. Keep an eye on cumulative update release notes and OEM firmware advisories.
  • Enterprise admins should expect more tools and scripts from Microsoft to help manage bulk updates; these emerged through the Secure Boot playbook and IT Pro blog posts over the last year.
  • Watch for vendor advisories from major OEMs (Dell, HP, Lenovo, ASUS, etc.) describing required firmware versions and special steps for particular devices.
  • If you run specialized workloads (custom boot loaders, real‑time controllers, niche security stacks), test updates in an isolated environment and coordinate with vendor support.

Strengths of Microsoft’s approach​

  • Automated delivery for the majority: letting Microsoft manage the certificate write offers a painless path for most consumers and many business devices, minimizing manual firmware interventions.
  • Collaboration with OEMs: shipping 2023 certs on new devices since 2024 and coordinating firmware updates reduces the number of devices that require manual steps.
  • Separation of signing roles: splitting signing responsibilities in the 2023 CAs (for example separating option ROM signing from boot loader signing) improves security hygiene and reduces blast radius for third‑party firmware components.
  • Advance notice and tooling: Microsoft published playbooks and guidance months in advance, giving organizations time to plan and test.

Weaknesses and areas of concern​

  • Dependency on OEM firmware: devices that need a firmware update are vulnerable to logistical delays (OEM support lifecycle, regional firmware availability, or custom OEM images from large integrators).
  • Telemetry dependence for managed rollout: Microsoft’s automatic staging favors devices that share diagnostic telemetry. Organizations that restrict telemetry must implement their own update pipeline.
  • Risk of BitLocker disruption: firmware writes are not risk‑free; without adequate preparation they can lead to recovery scenarios requiring IT intervention.
  • Legacy and unsupported devices: machines that no longer receive firmware updates from OEMs are left with a difficult choice: accept a degraded security posture or replace hardware.
  • Potential fragmentation for Linux and third‑party ecosystems: although mitigated by the inclusion of updated certs in many devices, edge cases in dual‑boot or custom boot setups may surface.

Practical tips and troubleshooting​

  • If your system reports a firmware requirement when the Secure Boot certificate update attempts to apply, check the OEM site for the specific BIOS/UEFI version flagged as a prerequisite and follow the vendor’s update procedure.
  • If BitLocker prompts for recovery after a firmware update, use your stored recovery key to regain access and then re‑enable BitLocker protection or re‑suspend/resume as required.
  • For IT admins: include Secure Boot certificate validation in change control and compliance reports. Track which devices have successfully received the update and which did not.
  • If you operate VMs or custom hypervisors, verify whether the guest Secure Boot variables mirror the host’s and whether the hypervisor vendor has guidance for the 2023 certs.
  • Dual‑booters should test their distro’s shim and bootloader on a test device with the 2023 certs applied, or consult their distro’s secure‑boot compatibility guidance.

Final assessment: why you should take this seriously—and act now​

This Secure Boot certificate update is an unglamorous but important piece of platform maintenance. It won’t block your PC from starting, but failing to update puts the device into a reduced‑trust state where future mitigations to boot‑level vulnerabilities cannot be delivered. In environments where security, compliance, or anti‑tamper assurances matter, letting Secure Boot certificates lapse is not an option.
The combination of Microsoft‑managed Windows Update rollout and OEM firmware provisioning makes the path forward practical for most users, but that convenience is not universal. The onus falls on IT administrators to inventory devices, coordinate OEM firmware updates, and validate that every machine that must remain secure receives the 2023 certificates before the 2011 roots expire.
In short: make Secure Boot certificate readiness a part of your 2026 maintenance plan. Verify Secure Boot is enabled, ensure your OS is within support (or enrolled in ESU where applicable), apply OEM firmware where necessary, back up BitLocker keys, and monitor the rollout in your environment. The work is manageable with planning—and it closes a door that attackers who target the earliest stages of system startup will otherwise find increasingly easy to exploit.

Source: Thurrott.com Microsoft to Roll Out New Secure Boot Certificates to Keep Old Windows PCs Secure
 

Microsoft has warned that several long‑lived Secure Boot certificate authorities that Windows and many OEM firmwares depend on will begin to expire in June 2026 (with a final boot‑signing PCA following in October 2026), and Microsoft — together with major OEMs — is actively rolling a replacement “2023 CA” family to capable devices to avoid a calendar‑driven loss of Secure Boot trust.

Neon blue holographic security icons hover above a motherboard, showing BIOS, a shield, and keys.Background / Overview​

UEFI Secure Boot is the firmware‑level trust gate that verifies the digital signatures of early boot components — bootloaders, shim binaries, option ROMs, and the Windows Boot Manager — before handing control to the operating system. The mechanism relies on a small set of certificate authorities (CAs) stored in firmware variables: the Platform Key (PK), the Key Exchange Key (KEK), the allowed‑signature database (DB), and the revocation database (DBX). When those CA certificates expire, the firmwept future updates or trust newly signed components that rely on the expired authorities.
Microsoft identified three Microsoft‑issued CAs originally provisioned around 2011 that are affected. The high‑level timeline Microsoft published groups expirations into two windows:
  • June 2026 — expiration window for several 2011 CAs (KEK and UEFI CA variants).
  • October 2026 — expiration window for the Microsoft Windows Production PCA that signs the Windows Boot Manager.
Those expiries are s for the certificates themselves, and the practical risk is not immediate mass‑bricking of PCs but a degradation or loss of Secure Boot updateability and the inability to validate newly signed pre‑boot components after the replacement certificates are required. Microsoft and OEMs are therefore pushing a coordinated remediation: a replacement certificate family issued in 2023 (the “2023 CA family”) and automated, telemetry‑gated enrollment mechanisms delivered via Windows cumulativeware packages.

What Microsoft and OEMs are doing now​

Microsoft’s approach is deliberately conservative and multi‑pronged:
  • It packaged the 2023 CA payloads into Windows servicing channels and began gating automatic Onrollment to devices that meet Microsoft’s readiness and telemetry checks. The January 2026 servicing cycle (notably KB5074109 and companion servicing packages) included the logic and targeting metadata to start gradual enrollments. (windowscentral.com)
  • OEMs are publishing per‑model guidance and shipping firmware (UEFI/BIOS) updates where firmware cooperation is required (for example, to accept KEK writes) and to ensure recovery images and provisioning pipelines are compatible. Many newer systems shipped after 2024 already include the 2023 CA family, while older systems depend on the OS‑side enrollment or a firmware update.
  • Microsoft will restrict automatic enrollment to devices showing “sufficient successful update signals” (a telemetry/health gating) to minimize the risk of mass regressions. Administrators retain manual deployment options through documented enterprise workflows (registry/GPO/WinCS/Intune), and Microsoft has published an FAQ and playbook to guide IT teams. ([support.microsoft.com](Frequently asked questions about the Secure Boot update process - Microsoft Support not an emergency that most consumers need to panic about, but it is a time‑sensitive operational task for administrators and for owners of older or specialized hardware that may not accept OS‑driven enrollments.

The technical mechanics — how the migration actually works​

Secure Boot trust is stored in a few UEFI variables. Microsoft’s OS‑side sequence is order sensitive to avoid leaving asted boot manager. The high‑level steps the operating‑system servicing flow aims to perform are:
  • Add the new Windows UEFI CA 2023 to the firmware DB so the platform will trust binaries signed under the new PCA.
  • Add the split Microsoft UEFI CA 2023 and Microsoft Option ROM UEFI CA 2023 into DB, separating bootloader signing from option ROM signing for finer policy control.
  • Add the Microsoft Corporation KEK 2K CA 2023 into KEK (this step can require OEM cooperation b KEK chain).
  • Replace the on‑disk Windows Boot Manager with a binary signed under the Windows UEFI CA 2023 and complete the hand‑off with a restart.
Each of those steps is instrumented; the OS exposes event log entries, registry values (for example, UEFICA2023Status and UEFICA2023Error), and a scheduled servicing task that runs per device to enforce the ordered transition. Microsoft will not attempt steps on deess checks, and administrators can force or assist the process manually using the published deployment controls.

Who is affected — prioritization guide​

Not every Windows device needs manual intervention. The riorities are:
  • Home users on modern OEM hardware (2018+ and especially 2024+ machines) that get Windows Update: most will transition automatically if updates and firmware are kept current.
  • Small business / unmanaged fleets: treat each device like a consumer PC. Ensure Windows Update is enabled and check OEM BIOS/UEFI updates for your model.
  • Enterprises, regulated environments, air‑gapped systems, or devices with telemetry disabled: these require an operational project. Inventory, pilot, and apply firmware updates and plan for manual certificate enrollment where OS‑driven updates are not possible. Microsoft’s guidance explicitly treats this as a crosslving security, endpoint management, and OEM coordination.
  • Virtual machines and cloud images: hypervisor vendors or cloud providers may need to publish updated virtual firmware images or enable pass‑through to ensure guests have the proper enrolled certificates. Test early.
  • Windows 10 systems: only those still in Extended Security Updates (ESU) or running supported LTSC channels will continue to receive the OS‑driven certificate enrollments via the ESU servicing path; Windows 10 general support ended in October 2025 and administrators must ensure ESU enrollment or upgrade to receive the remediation if required.

Concrete dates and KBs to watch for​

Microsoft’s public documentation and the first cumulative updates that included the enrollment logic appeared in the late 2025 / January 2026 servicing wave. Administrators should be particularly aware of:
  • KB5074109 — includeate rollout logic for supported Windows 11 branches and the device‑targeting metadata to begin enrollment.
  • KB5073724 and related servicing packages — mentioned in vendor and reporting articles as relevant to the rollout for certain Windows 10 servift’s Secure Boot FAQ and Windows IT Pro blog posts that summarize the expiries (June 2026 and October 2026) and provide the recommended playbook for IT.
If you manage systems, record these dates in your maintenance calendar and use them as fixed milestones for your enrollment and firmware sequencing plans.

Practical step‑by‑step playbook (for admins and advanced users)​

Treat this as a short, high‑priority project. Use the following checklist to triage and remediate:
  • Inventory and discovery
  • Scan your estate for Secure Boot status and firmware revisions. Use endpoint management tools to collect Secure Boot and BIOS version telemetry.
  • Identify systems that are air‑gapped, have telemetry blocked, or run custom firmware. Prioritize those for manual remediation.
  • Verify Secure Boot readiness on sample devices
  • Run PowerShell as Administrator and execute Confirm‑SecureBootUEFI (returns True if Secure Boot is enabled). Inspect enrolled keys with Get‑SecureBootUEFI when needed.
  • Check event logs for UEFICA2023Status entries after servicing runs.
  • Apply Windows and firmware updates
  • Ensure devices are running an in‑support Windows build that receives the certificate enrollment packages.
  • Apply OEM firmware/BIOS updates where vendors document minimum revisions to accept KEK/DB writes. OEM advisory pages list per‑model minimums and, in some cases, precise expiry dates for that hardware.
4t in a controlled group
  • Use a small set of devices to validate the full sequence (OS package, KEK/DB writes, boot manager swap) and log any errors. Track UEFICA2023Error and triage with vendor guidance.
  • Remediate blockers
  • For systems that block OS‑driven writes, coordinate with the OEM to obtain a firmware update or use the documented manual enrollment methods (for example, WinCS, Group Policy, or Intune-based pushes).
  • For air‑gapped systems, prepare a documented, reproducible manual process that involves a test plan and fallback recovery images.
  • Communication and exception handling
  • Inform help desks and security teams that devices without updated certificates will continue to boot but will be limited in receiving future Secure Boot fixes.
  • For legacy hardware that cannot be updated, plan replacement or compensating controls (isolation, limited network access, and heightened monitoring).
This is a cross‑team effort: endpoint, firmware owners, security operations, and procurement should all be looped in.

Gaming, anti‑cheat, and third‑party implications​

Anti‑cheat vendors increasingly treat Secure Boot as a integrity signal. If a device loses Secure Boot protections or cannot validate new pre‑boot components, some anti‑cheat systems may refuse to run or mation. Microsoft’s rollout aims to preserve the Secure Boot trust anchors so that anti‑cheat and other integrity‑sensitive software continue to function without interruption, but gamers on older or custom builds should keep firmware and OS updates current.
Third‑party OS vendors and Linlso affected in limited ways: distributions that use shim and require Secure Boot will need to adopt shims and signing chains that are compatible with the 2023 CA family. Vendors such as Red Hat have already published guidance and plan new shim releases signed under the updated Clidated and distributed. If you operate multi‑boot systems or custom signed modules, verify the enrolled CA set in firmware and plan updates accordingly.

Risks, caveats, and gotchas​

  • No instant bricking, but degraded protection: Devices without the new CAs will generally continue to boot after Junno longer receive future Secure Boot or Boot Manager updates. Over time that increases exposure to boot‑level threats. Microsoft’s FAQ is explicit that the device will still start and operate, but important protections will be lost.
  • Firmware incompatibility and OEM variance: The same Microsoft guidance stresses that per‑model firmware readiness matters. Some OEMs require a minimum BIOS revision to accept KEK writes, so device‑level checks are essential. Vendor advisories sometimes publish precise day‑level expiration mappings for specific devices, which can differ by model.
  • Telemetry gating means not everyone gets the OS‑side fix automatically: Microsoft will gate automatic enrollment by device health and update telemetry to reduce risk, which is sensible but means more administrative work for fleets that filter telemetry or run locked‑down images.
  • Virtual firmware and cloud images: VMs that rely on vendor firmware images without the 2023 CA may fail to trust new signatures. Coordinate with hypervisor and cloud providers.
  • Legacy hardware & special peripherals: Some legacy hardware that depends on old kernel drivers or on‑board option ROMs may be disrupted by firmware updates or by removing old trust anchors; organizations using such legacy peripherals should inventory and plan mitigations now.
If you see an unusual fnt, gather the UEFICA2023* registry and event log data before rolling back or invoking OEM recovery processes — that telemetry is essential to troubleshoot a complex firmware interaction.

How to check your device (simple checks for users and admins)​

  • Confirm Secure Boot is enabled:
  • Open a PowerShell prompt as Administrator.
  • Run Confirm‑SecureBootUEFI — it returns True when Secure Boot is enabled.
  • Check for the OS‑side enrollment status: look for UEFICA2023Status and UEFICA2023Error event log entries after applying recent cumulative updates. If your device reports a failure, consult OEM advisories for a firmware update or Microsoft’s troubleshooting playbook.
  • Keep Windows Update active and apply the latest cumulative updates for nd ESU servicing for eligible Windows 10 systems) and then check your OEM’s support site for BIOS/UEFI updates.

Final analysis — strengths and concerns​

Microsoft’s response has several strengths. The phased, telemetry‑gated model is prudent: it reduces the risk of a widespread regression and gives OEMs time to publish firmware readiness notes. Packaging the certificate payload into normal servicing channels means that the majority of well‑maintained consumer and enterprise endpoints will transition smoothly with minimal human intervention. The split of duties (separate CA for option ROMs, separate KEK) adds flexibility and defense‑in‑depth for future signing policies.
But there are real operational risks. The remediation touches firmware variables — a historically brittle surface where OEM variance and locked‑down platforms can produce edge‑case failures. Telemetry gating reduces blast radius but increases the manual remediation burden for air‑gapped, privacy‑sensitive, or compliance‑restricted environments that do not share the signals Microsoft uses to qualify devices for automatic enrollment. Enterprises must schedule inventory, pilots, and firmware sequencing now; leaving this for “later” risks a last‑minute scramble when certificates start lapsing.
There is also an ecosystem risk for non‑Windows and custom signers: shims, Linux distributions, hypervisors, and third‑party OS images must align their signing chains with the 2023 CAs or ensure their tooling can be trusted by the platforms that will receive the new certificates. Early vendor guidance from Linux distributors and hypervisor vendors already shows cross‑vendor action, but the task is non‑trivial for large heterogeneous estates.

Clear, immediate action items (summary checklist)​

  • For consumers:
  • Keep Windows Update enabled and apply suggested cumulative updates.
  • Check your OEM support page for BIOS/UEFI updates and apply them if available.
  • Run Confirm‑SecureBootUEFI to confirm Secure Boot is enabled.
  • For small IT teams:
  • Inventory Secure Boot state and firmware versions.
  • Apply Windows and OEM firmware updates to pilot groups.
  • Monitor event logs for UEFICA2023Status/UEFICA2023Error and escalate to OEMs for firmware fixes.
  • For enterprise and regulated environments:
  • Treat this as a high‑priority cross‑discipline project: security, endpoint, firmware, and procurement.
  • Identify air‑gapped and telemetry‑off systems and prepare manual enrollment workflows and documentation.
  • Coordinate with OEM account teams and cloud/hypervisor vendors for firmware and virtual firmware updates.

Microsoft’s certificate refresh is an unusual but necessary maintenance event — it’s not a feature update or a usability change, it’s a cryptographic housekeeping task that preserves the integrity of the platform’s earliest trust anchor. If you keep devices patched and firmware current, most of the work will be invisible. If you manage fleets, act now: inventory, pilot, and sequence firmware updates so your estate transitions cleanly before June and October 2026.

Source: Ars Technica Windows' original Secure Boot certificates expire in June—here's what you need to do
Source: Neowin Microsoft is updating key Windows security component to keep your PC safe
Source: PCMag Upgrade Now: Microsoft Issues Security Warning to Those Still on Windows 10
 

Microsoft and OEMs are rolling out a coordinated certificate refresh to replace Microsoft’s long‑lived Secure Boot certificates issued in 2011 — and if your Windows 11 PC doesn’t receive the new certificates before the 2011 keys begin expiring in June 2026 (with additional expiries through October 2026), that machine risks losing the ability to accept future Secure Boot updates and may fail to validate newer, properly signed pre‑boot components.

Tech infographic about Windows 11 rollout with TPM 2.0, firmware updates, and phased deployment.Background / Overview​

Secure Boot is a UEFI firmware mechanism that enforces a cryptographic chain of trust from the firmware through the bootloader and early OS components. Firmware maintains several protected stores — Platform Key (PK), Key Exchange Key (KEK), DB (allowed signatures) and DBX (revoked signatures) — which hold X.509 certificates and hashes that firmware uses to decide what it will run before the OS loads. Those certificates have finite lifetimes; several Microsoft‑issued CA certificates from around 2011 are scheduled to start expiring in June 2026, and a Windows boot‑signing PCA follows in October 2026. Microsoft has produced a replacement “2023 CA” family and is beginning an OS‑assisted, phased enrollment to migrate devices to the new trust anchors.
This is not an abstract PKI housekeeping task confined to the data center. Secure Boot changes are foundational: they affect firmware updates, boot managers, recovery media, multi‑boot setups, certain virtualization flows, and anti‑cheat systems used by many modern PC games. In short, the certificate rollover is both a security necessity and an operational event that must be planned and executed across diverse device fleets.

What Microsoft announced and how it’s being delivered​

In mid‑January 2026 Microsoft began bundling the replacement certificate metadata and device‑targeting logic into cumulative servicing updates for Windows 11 (for example, the January 13, 2026 cumulative update KB5073455 for Windows 11). Those updates do not immediately inject new firmware keys on every device; instead Microsoft uses a telemetry‑gated, phased rollout so only devices that demonstrate firmware readiness and acceptable update telemetry receive the OS‑side certificate enrollment automatically. The aim is to reduce accidental breakage while the ecosystem sequences firmware updates and OEM testing.
Key points about the delivery model:
  • The replacement certificates themselves are part of a coordinated OS/OEM operation rather than a simple, instantaneous change.
  • Microsoft’s updates include device targeting metadata so the OS will attempt enrollment only on devices that meet the vendor/firmware readiness signals.
  • Where firmware refuses or requires vendor interaction to accept a new KEK/DB enrollment, OEM firmware updates or guidance will be necessary.

Who is at risk — and who is not​

The short answer: most consumer devices that stay current with Windows Update and apply vendor firmware patches should transition cleanly; devices that do not are at real risk.
Devices likely to be protected automatically:
  • Newer Windows 11 systems with Secure Boot enabled and normal Windows Update behavior.
  • Machines whose OEM has shipped firmware that supports the 2023 CA family and accepts OS‑side enrollments.
Devices that need attention:
  • Machines with Secure Boot disabled or running legacy BIOS/MBR configurations; these will not automatically receive the firmware‑level enrollment and remain exposed until corrected.
  • Systems behind managed update policies, air‑gapped networks, or with Windows Update paused — they may not receive the necessary OS package in time.
  • Devices requiring OEM firmware updates to accept the new KEK/DB entries — these often need manual firmware installs from the vendor.
  • Virtual machines and some hypervisor setups that emulate Secure Boot differently; VM images with Secure Boot disabled will not get the enrollment by themselves.

What can go wrong — realistic consequences​

Headlines about “millions of bricked PCs” overstate the most likely outcomes, but the consequences are meaningful and potentially costly:
  • Loss of firmware‑level update path: A device that still trusts only the expiring 2011 certificates and does not receive the replacement set may be unable to accept future Secure Boot updates and therefore lose the ability to receive mitigation updates for boot‑level threats.
  • Boot validation failures: If the platform’s DB/KEK state is inconsistent with the Windows Boot Manager or other signed components, some pre‑boot code or recovery media might fail validation and refuse to run, making recovery or updates more complex.
  • Gaming and anti‑cheat disruption: Several anti‑cheat systems and game launchers rely on platform attestation via Secure Boot and TPM. If a device’s trust anchors are not updated, anti‑cheat checks could block game launches or cause online failures until publishers and OEMs coordinate patches. This is a real, short‑term compatibility vector for gamers.
  • Operational regressions from the January updates: The January 2026 cumulative updates also removed some legacy modem drivers and contained a narrow shutdown/hibernate regression affecting systems with System Guard Secure Launch enabled — meaning organizations must test broadly before pushing updates to sensitive groups.

Immediate actions for home users (priority checklist)​

If you have even a single Windows 11 PC, these are the practical, prioritized steps to reduce risk:
  • Confirm Windows Update is enabled and install recommended updates. Microsoft’s January 2026 updates include the device targeting logic for certificate enrollment; keeping updates current is the simplest preventive step.
  • Check Secure Boot and TPM status:
  • Run System Information (msinfo32) and verify Secure Boot State is On or at least Supported, and that BIOS Mode is UEFI. Use tpm.msc to confirm the presence of TPM and whether it reports TPM 2.0.
  • Apply firmware updates from your OEM when available. If your vendor has firmware advisories or BIOS updates that mention Secure Boot or certificate enrollment, install them before the June 2026 deadline.
  • For gamers: keep anti‑cheat, game clients, and drivers updated and monitor publisher notices if you see launch errors after installing platform updates.
  • Back up before making risky changes. If you must switch from Legacy/MBR to UEFI/GPT, use Microsoft’s MBR2GPT tool only after taking a full backup or disk image.
If any of these checks reveal that Secure Boot is disabled, or the system still boots in Legacy mode (MBR), plan to enable UEFI and enable Secure Boot — that can often be done by toggling firmware settings and, if needed, converting the system disk to GPT. Detailed, step‑by‑step guidance is available from Microsoft and trusted tech outlets; follow those steps carefully and always back up first.

Immediate actions for IT teams and administrators​

For enterprises, education, and other environments with many endpoints, this is an operational event that must be scheduled and tracked. Microsoft’s January updates mark the beginning of the enrollment timeline — treat them as such. Recommended program of work:
  • Inventory: Collect a firmware and Secure Boot inventory of your estate. Capture BIOS/UEFI versions, Secure Boot State, TPM availability and versions, and Windows Update servicing stack versions. Use Microsoft’s recommended scripts and management tooling where available.
  • Apply servicing stack updates (SSUs) and the January cumulative updates in a controlled pilot ring. The January packages include the device‑targeting payloads; your pilot results will reveal per‑model readiness and any regressions.
  • Coordinate OEM firmware updates: For models that require a firmware bump to accept the new KEK/DB enrollments, schedule vendor firmware rollouts before applying the certificate payloads broadly. OEM advisories may list minimum BIOS versions.
  • Test BitLocker and recovery workflows: The boot path is changing. Validate BitLocker recovery procedures in your pilot group (simulate recovery scenarios) and confirm you can recover devices without prolonged downtime.
  • Plan staged deployment windows and rollback plans: Because the update touches pre‑OS components and some optional drivers were removed in January, design your rollouts with the ability to hold, roll back, or remediate quickly when issues arise.
A sensible rollout order:
  • Pilot on a representative sample of hardware families (including laptops, desktops, and VDI images).
  • Apply OEM firmware updates where required.
  • Deploy Windows SSU + January cumulative update to target groups.
  • Validate certificate enrollment success (use event logs and Microsoft’s instrumentation).
  • Expand to broader rings when signals are green.

How Microsoft’s telemetry‑gated approach changes the plan​

Microsoft’s phased model means the OS will only enroll the new certificates on devices that report readiness signals. That reduces the chance of widespread breakage, but it also means you cannot rely on a purely passive approach if your environment has devices with non‑standard firmware or constrained update paths. Manual firmware updates or vendor coordination will still be required for some models. Treat the January updates as the enrollment start, not the resolution.

Step‑by‑step: check and fix Secure Boot / TPM (concise how‑to)​

These steps are the minimum inspection and remediation actions for individual devices before June 2026.
  • Run msinfo32.exe (Windows + R → msinfo32).
  • Look for BIOS Mode: should read UEFI.
  • Look for Secure Boot State: On is ideal; Supported means firmware can enable it; Off means disabled.
  • Run tpm.msc (Windows + R → tpm.msc) to confirm TPM presence and reported version (TPM 2.0 preferred for Windows 11 feature parity).
  • If disk partition style is MBR, convert to GPT using MBR2GPT (only after full backups). Microsoft’s MBR2GPT can convert in many cases without reformatting, but every environment is different — backup first.
  • Reboot into UEFI/BIOS firmware to:
  • Switch to UEFI mode (not Legacy/CSM).
  • Enable Secure Boot (if available).
  • Enable Firmware TPM / Intel PTT / AMD fTPM as appropriate.
  • Save and reboot; verify in Windows that Secure Boot and TPM now show as On.
If Secure Boot options are greyed out you may need to set a firmware supervisor password first, or the OEM may require a firmware update to expose the options. Always consult OEM guidance for model‑specific firmware steps.

Workarounds, unsupported installs, and their risks​

Some community‑backed workarounds exist to keep older hardware running Windows 11 — but they carry tradeoffs:
  • Registry override (MoSetup) to bypass certain preflight checks: can enable in‑place upgrades on devices with UEFI/TPM present but a CPU that isn’t on Microsoft’s support list. This preserves apps/settings in many cases, but it is unsupported by Microsoft and may affect future servicing.
  • Rufus‑built installers: Rufus can create installation media that removes TPM/Secure Boot checks for clean installs. Useful for unsupported devices, but again unsupported and doesn’t add missing CPU instructions required by newer Windows builds.
If your device is hardware‑blocked (missing CPU instruction support required by current Windows 11 releases), there is no installer hack that will restore full compatibility. Those machines should be considered for OS alternatives or hardware replacement.

OEM coordination and per‑model caveats​

Firmware diversity is the core operational challenge. While Microsoft controls the OS side of the certificate roll, many devices require vendor firmware to accept or finalize KEK/DB changes. OEM advisories often list minimum BIOS versions and model‑specific instructions — follow those lists rather than generic advice when available. Some vendors have already posted explicit guidance and firmware updates tied to the June–October 2026 expiry windows. Where OEM notes and Microsoft guidance diverge on exact enrollment order or minimal firmware, treat the OEM’s published minimum firmware list as authoritative for that model and validate enrollment in a pilot.

Realistic worst‑case scenarios and mitigation​

What happens if a device fails to get updated before a certificate expiry? The most likely outcomes, ranked by probability:
  • Inability to accept future Secure Boot updates and boot‑level mitigations — mitigated by keeping device offline until remediation or enabling alternate recovery workflows.
  • Compatibility issues with anti‑cheat or signed boot components — mitigated by vendor patches and validated rollouts.
  • Recovery or repair requiring OEM firmware reflash, recovery media, or manual KEK/DB manipulation — mitigated by preemptive firmware updates and pilot testing.
While catastrophic, non‑recoverable “bricking” across wide populations is unlikely given Microsoft’s conservative deployment strategy, it is not impossible for niche hardware that refuses firmware updates or for fleets that block Windows Update entirely. The responsible approach is inventory, pilot, firmware coordination, and prioritized remediation.

Timeline and urgency — exact dates​

  • June 2026: Several Microsoft KEK and UEFI CA certificates issued in 2011 begin to expire; Microsoft’s rollout intends to enroll replacements before this date for devices that are ready.
  • October 2026: Additional Microsoft boot‑signing PCA certificates reach end of life; this is a hard deadline for components signed under those specific keys.
These are real dates — do not treat them as vague. If your environment includes devices that do not receive monthly updates or require firmware updates from vendors, begin remediation planning now. Microsoft’s January 2026 updates are the trigger and the operational starting point for broad enrollment; they do not eliminate the need for local verification and vendor coordination.

Final recommendations — prioritized actions (concise)​

  • For every PC: ensure Windows Update is enabled and apply the January 2026 cumulative updates when available for your channel.
  • Check Secure Boot State and TPM with msinfo32 and tpm.msc; enable them if firmware supports it.
  • Inventory firmware versions and coordinate OEM BIOS/UEFI updates where required; pilot before broad deployment.
  • For managed fleets: apply SSU + January cumulative update to a pilot ring, validate certificate enrollment using event logs and Microsoft’s guidance, then expand in stages.
  • Back up and prepare recovery media before making partition or firmware changes; convert MBR→GPT only after full backups when necessary.
  • Communicate to users about potential short‑term impacts (game anti‑cheat errors, removed legacy modem support) and provide support channels for recovery.

Conclusion​

This Secure Boot certificate rollover is a high‑importance, time‑sensitive platform maintenance event. Microsoft’s phased, telemetry‑gated rollout reduces the risk of mass breakage, but it cannot substitute for good housekeeping: inventory, firmware coordination, pilot testing, and an explicit remediation plan are essential. For most consumers the path is straightforward — keep Windows updated and install OEM firmware updates — but for organizations and owners of older or locked devices, now is the time to act. Treat the June–October 2026 expiry windows as real deadlines, and prioritize the checks and updates described here to keep your Windows 11 devices secure and serviceable.

Source: PCWorld Older Windows 11 PCs need a Secure Boot fix ASAP
Source: Notebookcheck Microsoft sets 2026 deadline for Secure Boot certificate expiration
 

Microsoft has issued a blunt, time‑bound warning: several long‑lived Secure Boot certificates provisioned around 2011 will begin to expire in mid‑2026, and devices that do not transition to Microsoft’s replacement certificate family risk losing the ability to receive security fixes and trust newly signed pre‑boot components. This isn’t routine housekeeping — it’s a platform‑level trust migration that touches firmware, OEM BIOS processes, Windows servicing, and enterprise update playbooks, with real operational consequences for desktops, laptops, VMs, and managed fleets.

Hand inserts a USB drive as blue holographic security panels show Secure Boot and a shield.Background / Overview​

Secure Boot is a UEFI‑level trust gate that verifies signatures on pre‑OS binaries — bootloaders, shim binaries, option ROMs, and the Windows Boot Manager — before handing control to the operating system. That trust is rooted in a handful of X.509 certificate authorities stored in firmware variables commonly called PK (Platform Key), KEK (Key Exchange Key), DB (allowed signature database), and DBX (revocation database). When a CA stored there expires, the platform new signatures tied to that CA for updates or newly issued components unless a new CA is enrolled.
Microsoft and many OEMs originally provisioned a set of Microsoft‑issued CA certificates in or around 2011. Those certificates were intentionally long‑lived; the calendar now catches up. To prevent a calendar‑driven break in the boot‑time trust chain, Microsoft created a certificates (the 2023 CA family) and is coordinating a staged delivery through Windows servicing and OEM firmware updates. The vendor’s guidance is explicit: devices must be moved to the 2023 certificate set before the 2011 CAs lapse.

What is expiring, and when​

Microsoft’s public documentation and the IT pro playbook map the windows:
  • June 2026 (beginning window):
  • Microsoft Corporation KEK CA 2011 — expires June 2026. Replacement: Microsoft Corporation KEK 2K CA 2023 (stored in KEK; signs DB/DBX updates).
    -1 — expires June 2026. Replacements: Microsoft UEFI CA 2023 and Microsoft Option ROM UEFI CA 2023 (split roles for finer trust separation). ([support.microsoft.com](Windows Secure Boot certificate expiration and CA updates - Microsoft Support 2026 (final window):**
  • Microsoft Windows Production PCA 2011 — expires October 2026. Replacement: Windows UEFI CA 2023 (used for Windows Boot Manager signing).
Vendor advisories sometimes specify precise day‑level dates (for example, some OEMs list dates in late June and a day in October), but the practical operational deadline to be prepared is the month windows above; confirm exact calendar days for your models with OEM guidance before planning last‑minute remediations.

How Microsoft is delivering the replacement certificates​

Microsoft’s rolcautious and multi‑pronged:
  • Windows cumulative updates now include device‑targeting metadata and health‑gating logic that identifies eligible systems and enrolls the 2023 certificates only after telemetry shows the device can safely accept the change. This reduces the risk of mass failures when an OS‑delivered certificate is applied ot accept it. The January servicing cycle began shipping the enrollment logic embedded in monthly updates such as KB5073724 (Windows 10 ESU branches) and KB5074109 / KB5073455 variants for Windows 11, which add the required device targeting and enrollment machinery.
  • For platforms that disallow OS‑initiated variable writes or require vendor authentication, OEM firmware (BIOS/UEFI) updates are re publishing model‑specific minimum BIOS versions and instructions; on some older systems, a manual firmware update may be the only way to accept the new KEK/DB entries.
  • The update flow is order‑sensitive by design: enroll the new DB entries (allowlist), then the KEK (updates that authorize future DB/DBX changes), and — where necessary — swap the Windows Boot Manager binary for one signed by the new PCA only after the platform trusts that PCA. Microsoft exposes enterprise controls (Group Policy, registry, Intune/MDM hooks) and event‑log instrumentation so administrators can gate, monitor, or opt in/out of automated enrollment.
This telemetry‑gated, phased approach protects large numbers of devices, but it also introduces a task: organizations and advanced users must inventory theirirmware readiness instead of assuming automatic enrollment will succeed everywhere.

Why this matters: the security and serviceability impact​

The practical consequences of failing to migrate before the 2011 CA expirations are concrete, not speculative:
  • Devices that still rely exclusively on the expiring 2011 certificates will not be able to receive new Secure Boot security updates after the expiry dates. That means fixes foot‑time vulnerabilities cannot be installed via standard Secure Boot update channels.
  • Firmware will refuse to accept signatures issued under the expired CA for future updates. New boot managers, shims,oaders signed with the 2023 keys will not be trusted on such devices until the new CAs are installed. This can create compatibility issues when software vendors or Microsoft ship updated pre‑boot components signed with the new PCA.
  • Certain platform security scenarios that rely on Secure Boot trust — BitLocker hardening, Secure Launch/System Guard, and anti‑cheat protections used by modern games — may function with degraded protections or encounter failures if the underlying boot trust can no longer be updated. Anti‑cheat providers have called attention to the expiry because their integrity stacks depend on a reliable Secure Boot trust chain.
  • The threat is not only theoretical: UEFI bootkits like BlackLotus have demonstrated that attackers can target the boot path; the ability to deliver revocations pre‑OS environment is therefore material to endpoint protection. Microsoft explicitly cites bootkit risk in its IT pro guidance as a major reason to prioritize this migration.
Importantly, Microsoft clarifies the user‑observable behavior: an affected device that reaches an expiration without the new certificates will generally still start and operate normally; the immediate effect is an erosion of the ability to receive boot‑time security fixes and to validate newly signed boot components. Over time, however, the exposure widens as new mitigations become unavailable.

Who is affected — and who isn’t​

The scope is broad but not universal:
  • Potentially affected: Most Secure Boot‑enabled Windows devices manufactured since roughly 2012 may contain the expiring 2011 certificates and therefore need to be updated. That includes desktops, laptops, many workstations, and some server classes, depending on firmware provision. Managed fleets in enterprises, devices in isolated networks, and machines that haven’t received recent firmware updates are higher risk because they may not meet Microsoft’s “high confidence” telemetry gating.
  • Less likely to be affected: Newer hardware sold in 2024 and beyond frequently already ships with the 2023 certificates provisioned in firmware; those systems are not at risk of being unable to accept the new keys. Likewise, devices with Secure Boot disabled are not subject to the certificate rollout (though disabling Secure Boot is not a recommended mitigation because it removes an important layer of protection). ([support.microsoft.com](When Secure Boot certificates expire on Windows devices - Microsoft Support Virtual machines and cloud images: VM guests will be affected if their virtual firmware (OVMF/UEFI image) does not include the new certificates or if the cloud provider does not allow guest VM variable updates. Admins running VMs in private clouds or PaaS environments must verify the virtual firmware image and the hypervisor/provider support for OS‑driven enrollment. Microsoft’s guidance explicitly lists virtualized environments as a special case to validate.
  • Windows 10 and EOL considerations: Devices that are running Windows 10 outside of supported servicing windows (for example, un‑enrolled Home users after Windows 10’s public end‑of‑support) may not receive the automatic enrollment unless they are covered by Extended Security Updates (ESU) or the device is on an eligible servicing path. Confirm OS‑level eligibility before assuming automatic enrollment.

Operational checklist: what to do now (home users and admins)​

Start now — treat this a calendarized project. The remediation steps differ by scale, but the core verifications are the same.

Quick checks every user can run​

  • Confirm Secure Boot is enabled
  • Open an elevated PowerShell and run:
  • Confirm-SecureBootUEFI
  • A return value of True means Secure Boot is enabled. If it returns False orrted, address firmware or platform limitations first.
  • Install the latest servicing stack and cumulative updates
  • Make sure the device has the latest SSU and the January 2026+ cumulative updates (the packages that contain the enrollment logic are part of current servicing cycles). Examples cited by Microsoft include the January servicing builds and KB5073724/KB5074109 metadata.
  • Check OEM firmware availability
  • Look up your device model on the OEM support page and confirm whether a BIOS/UEFI update is required to support OS‑driven certificate enrollment. If an OEM firmware update exists, schedule its application before the relevant expiry window.

For administrators and IT teams — a succinct playbook​

  • Inventory yofy devices with Secure Boot enabled, operating systems, and current firmware build numbers. Use management tooling (Intune, SCCM, or other EMM) to collect these signals at scale. Microsoft provides a deployment playbook and example scripts for inventory and deployment gating.
  • Validate update paths:
  • Ensure devices can reach Microsoft update domains and that SSUs are installed. Verify group policies and firewall rules don’t block certificate downloads or enrollment steps.
  • Pilot, monitor, and roll:
  • Use a phased rollout: pilot on representative models and update rings, gather event log event IDs and registry flags), and then scale to broader rings once telemetry affirms success. Keep rollback and recovery USB boot images ready in case a device falls back to older firmware states.
  • Track special‑case hardware:
  • Identify legacy peripherals (fax/modem, industrial controllers) and VMs that need separate remediation paths. In previous servicing updates, Microsoft removed several legacy modem drivers, which caused functional loss in a minority of specialized environments — inventory first, patch with caution.
  • Communicate timelines:
  • Share the June/October 2026 windows with stakeholders and coordinate firmware vendors — late firmware updates cannot be invented after expiry and some OEM support lifecycles may limit available updates for end‑of‑life models.

Known issues, caveats and practical risks​

Microsoft’s phased approach reduces systemic risk, but administrators must be aware of documented regressions and operational caveats encountered during early deployments:
  • Some January servicing updates that introduce the enrollment logic carried configuration‑specific regressions on a subset of Windows 11 systems with System Guard Secure Launch enabled. Reported symptoms included shutdown/hibernate regressions where affected devices would restart instead of powering off; Microsoft documented workarounds (for example, using an elevated shutdown command) and marked the issue as being investigated. Test on representative hardware and avoid broad, immediate deployment into Secure Launch‑enabled rings without pilot validation.
  • On certain platforms, firmware‑level constraints prevent OS‑side writes to KEK/DB variables. Those devices require an OEM firmware firmware/BIOS update before the 2023 certificates can be enrolled. Failure to coordinate firmware updates and OS updates will leave devices excluded from the automatic enrollment and thus at risk.
  • Virtualization caveats: cloud or hypervisor images that do not include the new certificates in their virtual firmware image or do not permit guest‑initiated variable updates will remain dependent on provider action. Plan valirvisor vendors.
  • Special hardware and legacy drivers: some servicing updates have also removed legacy in‑box drivers (notably se which has operational implications for niche hardware that still relies on them. Test and inventory before mass deployment.
Where Microsoft’s public KBs and OEM advisories conflict in precise day numbers, treat the vendor‑specifiare as authoritative and plan accordingly. Small calendar discrepancies in published advisories reflect vendor‑level publishing differences rather than a contradiction about the existence of the risk window.

Balancing automation and control: recommended governance​

For enterprises, the right posture balances Microsoft’s automated assist with centralized controls:
  • Use Microsoft’s telemetry gating to accelerate enrollment for healthy, up‑to‑date devices while maintaining manual‑enroll options for special cases (imaging labs, air‑gapped systems, regulated environments).
  • Maintain a defined pre‑migration checklist that includes firmware minimums, SSU presence, Secure Boot state verification, and a communications plan for helpdesk and endpoint teams.
  • Log and centralize event IDs and registry flags Microsoft provides so that you can detect partial enrollments, enrollment failures, and devices that require OEM firmware updates.

What to tell enge brief)​

  • “Windows will automatically update these boot security certificates on most modern PCs, but you should keep Windows and firmware updated. If your PC is older or managed by your company, contact IT to confirm we’re covered. Do not disable Secure Boot to ‘work around’ this — that reduces protection.”
  • If you plaanti‑cheat drivers, keep your system up to date — anti‑cheat vendors rely on Secure Boot as part of their integrity stack and may require the new certificates to avoid compatibility issues.

Critical perspective: strengths of Microsoft’s approach — and residual risks​

Microsoft’s plan has clear strengths. The vendor:
  • Anticipated the expiry window and produced a replacement CA family rather than leaving customers exposed or forcing a brittle, last‑minute fix.
  • Embedded the enrollment logic in regular Windows servicing with health‑gating telemetry to reduce the chance of a mass failure event.
  • Published a detailed IT pro playbook and worked with OEMs to coordinate firmware readiness, acknowledging that firmware is an essential gating factor.
Those are solid design decisions, but some residual risks remain:
  • Device fragmentation: the ecosystem of OEM firmware versions, custom motherboards, and legacy images means some devices will require manual intervention — and those manual paths are exactly where mistakes and delays occur.
  • Visibility and telemetry gaps: Microsoft’s “high confidence” gating reduces risk but depends on diagnostic signals being available and accurate. Environments that block telemetry or are offline by design will be excluded from automatic remediation without deliberate alternative processes.
  • Unknown regressions at scale: early reports of shutdown/hibernate regressions and driver removal side effects show that even well‑tested updates can create configuration‑specific impacts. Rigorous pilot testing is not optional.
  • Timelines and vendor support windows: OEMs will not publish firmware updates for every model indefinitely; some older hardware may not receive firmware updates at all, leading to a trade‑off between hardware replacement and accepting a weaker boot‑security posture. Document this risk openly with procurement and security leadership.

Final verdict — the practical takeaway​

This is a broadly manageable but time‑sensitive platform upgrade: Microsoft has engineered an orderly, telemetry‑backed migration path and published detailed guidance, and many modern devices already include the 2023 certificates in firmware. That means most consumer devices that are kept current will transition without user intervention. However, the hard truth is that the remaining devices — older business systems, air‑gapped machines, certain VMs, and platforms dependent on OEM firmware updates — require active attention now, ahead of the mid‑2026 and October‑2026 expiry windows. Ignoring the calendar risks loss of future boot‑time fixes, degraded security posture against bootkits, and compatibility issues with freshly signed boot components.
Start with inventory, confirm Secure Boot state across your estate, apply the latest servicing stack and cumulative updates, check OEM firmware readiness, and run a measured pilot. For single‑machine users: keep Windows and firmware updated, and if your OEM provides a BIOS/UEFI update, install it. For IT teams: treat this as a cross‑team factory line — security, endpoint management, firmware support, and procurement must coordinate now so the platform trust hand‑off completes well before June 2026.
Conclusion: this is not a sudden, existential break in Windows, but it is a deadline that changes the fundamental verifiability of the boot path — fix the trust anchors now rather than trying to repair them later.

Source: Windows Report https://windowsreport.com/microsoft...arning-ahead-of-2026-certificate-expiry-date/
 

Microsoft has quietly begun a coordinated refresh of the cryptographic anchors that underpin Secure Boot on Windows PCs, pushing replacement certificate authorities into firmware and the operating system to avoid a calendar-driven degradation of boot-level trust when Microsoft-issued certificates from 2011 begin to expire in mid‑2026.

Blue neon computer board with a Secure Boot shield, UEFI firmware chip, and a 2023 PCA diagram.Background and why this matters now​

Secure Boot is a firmware-level trust gate in UEFI systems that verifies signatures for every binary that runs before the OS — bootloaders, option ROMs, pre-boot drivers, and other EFI applications. It relies on a small set of cryptographic artifacts stored in firmware: the Platform Key (PK), Key Exchange Keys (KEK), the allowed-signature database (DB) and the revoked-signature database (DBX). When the Certificate Authorities (CAs) that live in those stores expire, firmware retains the ability to boot, but it loses the ability to accept new signed boot components or to apply Secure Boot updates reliably.
The practical implication is straightforward: devices that arrive at the expiry window still boot, but they enter a degraded security state in which future boot‑level updates, mitigations, and compatibility for newly signed components can be blocked or ignored. Over time this increases attack surface for bootkits and can interrupt the ability to support new hardware, anti‑cheat protections, and virtualization features that depend on a functioning Secure Boot chain.
Microsoft and OEMs anticipated this long before the calendar arrives. A replacement family of Microsoft-issued CAs was published in 2023 and is now being delivered to in‑market devices through a combination of Windows Update (OS-side firmware writes) and OEM firmware updates. The goal: ensure that the firmware root of trust is refreshed before legacy 2011-era certificates lapse in June–October 2026.

Timeline: which certificates and when they expire​

  • June 2026 — The widely deployed Microsoft CA entries introduced around 2011 (notably the Microsoft Corporation KEK CA 2011 and Microsoft UEFI CA 2011) are scheduled to reach end-of-validity around this month.
  • October 2026 — A remaining Microsoft Windows Production PCA in the same 2011 family reaches expiry later in the year; this one is tied to signatures for the Windows boot manager specifically.
Microsoft has mapped those 2011 CAs to a new "2023" certificate family with names that reflect broken-out responsibilities (for example: Windows UEFI CA 2023, Microsoft UEFI CA 2023, Microsoft Option ROM UEFI CA 2023, and Microsoft Corporation KEK 2K CA 2023). That split gives finer-grained control over what the platform trusts (separating bootloader signing from Option ROM signing, for example).
Note: OEM advisories sometimes list day-level date differences for some platforms (vendor pages have cited particular days in June and October for specific models), so administrators who need exact cutover days must consult vendor guidance for each model.

How Microsoft is delivering the update (mechanics and constraints)​

Microsoft adopted a layered, conservative rollout to minimize risk of mass regressions:
  • Windows cumulative updates beginning in late 2025 / January 2026 include the OS-side tooling, metadata, and scheduled servicing tasks that can enroll the 2023 CA family into firmware variables on eligible devices. The delivery is controlled and telemetry‑gated — Microsoft only pushes the enrollment to devices that demonstrate successful update telemetry and a healthy firmware update path.
  • Where firmware will not accept OS-driven writes or where OEM cooperation is required to safely update KEK entries, OEMs supply firmware (BIOS/UEFI) updates that include the new certs. Devices shipped since 2024 commonly already include the 2023 certs in firmware; older systems may need a vendor firmware update.
  • The detailed sequence used by the OS-side flow is order-sensitive to avoid leaving devices in an untrusted state: add new DB entries, add KEK replacements (when allowed), swap to a Windows boot manager signed with the new PCA, and then finalize the hand-off with a reboot. Microsoft’s January 2026 update family (including packages such as the Windows 11 cumulative updates referenced in recent advisories) carries the enrollment logic and targeting metadata.
This is not a blanket “write everywhere” operation — it’s intentionally staged and dependent on both firmware capability and the device successfully reporting update readiness back to Microsoft’s servicing systems. That gating reduces rollout risk but also means some devices will require manual intervention or OEM firmware updates.

What devices and scenarios are affected​

  • Most consumer and business PCs with recent firmware — If you keep Windows Update enabled and your OEM firmware is up to date, the transition is expected to be automatic and invisible. Many systems shipped since 2024 include the 2023 certs preloaded.
  • Older in‑market PCs (pre‑firmware updates) — Desktops and custom motherboards made before 2012 or those with firmware that lacks OS-side write support may require an OEM firmware update or manual remediation.
  • Windows 10 (ESU) devices — Windows 10 devices that are enrolled in Extended Security Updates remain in scope for certificate enrollment, but OEM/firmware sequencing and ESU enrollment status matter. Administrators must include ESU-managed systems in their rollout plans.
  • Servers, IoT, and specialized systems — Edge devices, servers, and IoT hardware sometimes run firmware images that are locked down for regulatory or operational reasons. These platforms may follow different update paths and occasionally require OEM firmware updates or vendor cooperation.
  • Dual-boot and alternative OSes (Linux, BSD, etc.) — Many Linux distributions rely on a signed shim binary chain that historically used the Microsoft 2011 PCA signature. Distributions and their shim maintainers must ensure shims are signed by the new 2023 PCA (or dual-signed) to remain compatible with updated firmware. Systems that never receive new certs in firmware may be unable to boot Linux images that require the newer signatures.
  • Virtual machines and cloud images — VMs that emulate UEFI or use vendor virtual firmware may need updated virtual firmware images or special handling so guests maintain a current set of enrolled CAs. Hypervisor vendors and cloud providers may need to update images and templates.

Practical impact of “expired” certificates — what actually breaks​

  • Devices with only expired 2011 CAs will continue to boot in many configurations, but they will no longer be able to trust new signatures issued under the 2023 CA family or accept Secure Boot DB/DBX updates signed under the new keys. That means future boot‑manager mitigations and new signed pre‑boot components could be rejected, limiting security updates' effectiveness.
  • Certain software that depends on Secure Boot as a platform integrity signal — notably modern anti‑cheat systems and some virtualization/hypervisor features — may impose runtime requirements that fail in degraded Secure Boot states. Gamers and professionals using such toolchains should be especially mindful.
  • In enterprise contexts, the inability to enroll new certificates can become a compliance and supportability issue. IT teams could find themselves with a mixed fleet, some fully trusted and some functionally limited, complicating patching and risk management.

What Microsoft recommends — and what admins should do now​

Microsoft’s public guidance and associated KB notes emphasize a cross-functional, inventory-driven approach for organizations and a simple update-first approach for most home users. Key recommended actions include:
  • Ensure Windows Update and OEM firmware updates are applied. For the majority of consumers and unmanaged business devices, keeping automatic updates on will make this process invisible and automatic where firmware supports it.
  • Inventory Secure Boot status and firmware readiness across your fleet. Use tools and scripts to check Secure Boot state and the presence of expected UEFI variables. Microsoft-provided PowerShell cmdlets such as Confirm-SecureBootUEFI and Get-SecureBootUEFI are useful on individual systems.
  • Identify devices that require OEM firmware updates and schedule those updates before the critical expiry windows. Work with OEM support pages and platform advisories to compile a minimum‑firmware matrix per model.
  • For air‑gapped, regulated, or telemetry-disabled environments, plan manual remediation workflows: deploy certificates via supported enrollment tools, ensure firmware is updated, and validate the hand‑off sequence in a test lab. Don’t rely on Microsoft’s telemetry gating in environments that intentionally block diagnostics.
  • For Windows 10 devices on ESU, confirm ESU enrollment and update status, as the certificate enrollment logic was added to supported servicing flows — but ESU lifecycles and OEM support windows are additional constraints.
  • Test recovery and provisioning images. Some recovery media and provisioning pipelines use boot components signed under older chains; update and validate those images before deploying them into production.
Recommended immediate playbook for administrators (high level):
  • Inventory your fleet for Secure Boot status and firmware version.
  • Identify models needing OEM firmware updates and schedule them.
  • Apply the January/early‑2026 cumulative updates that include certificate enrollment logic to a pilot group.
  • Validate enrollment and the new Windows boot manager signature on pilot systems.
  • Scale the rollout in waves, monitoring telemetry and boot health.
  • For any non-updatable systems, create mitigation plans (isolation, replacement, or vendor engagement).

Special considerations, edge cases, and risks​

  • Telemetry gating can leave some devices behind. Microsoft’s safety-first rollout means devices that do not report the expected update telemetry — intentionally or otherwise — may not receive automatic enrollment and will require manual OEM-driven remediation. This is particularly relevant for privacy-conscious, air‑gapped, or restricted environments. Plan for manual steps.
  • Firmware that forbids OS-driven writes. Some OEMs ship firmware that does not permit the OS to write KEK or DB entries. Those devices require a firmware update from the vendor. If the vendor no longer supports the model, remediation may require hardware replacement.
  • Third-party boot chains and multi‑boot setups. Linux distributions and other OSs that rely on a Microsoft-signed shim may need dual-signing or new builds signed against the 2023 CA. Distros have been tracking the transition, but older recovery media or custom boot images could fail unexpectedly on devices that switch to the new PCA. Validate all boot images and recovery tooling.
  • Virtualized firmware mismatch. Cloud images, VM templates, and virtual firmware must be reviewed. Some virtual platforms may need vendor updates to include the 2023 CA family or to pass through UEFI variables correctly to guests. Test workloads in virtualized environments early.
  • Unverifiable or vendor-specific date granularity. While Microsoft published the June–October 2026 grouping, some OEM pages list precise day numbers for specific cert expirations. These vendor-specific day values should be considered authoritative for scheduling model-level updates; treat any publicized day numbers from third parties as vendor‑conditioned and verify against OEM advisories.

Validation: how to check your device and verify enrollment​

For administrators and power users who want to validate whether a device already has the new 2023 CA entries:
  • On an endpoint, run an elevated PowerShell and use Confirm-SecureBootUEFI. If Secure Boot is enabled, that’s a start. Use Get-SecureBootUEFI to inspect the presence of certificates in the firmware variables where accessible. The enrollment process also replaces the Windows boot manager with a binary signed under the Windows UEFI CA 2023; checking the boot manager’s signing certificate is another confirmation point after a reboot.
  • For large fleets, use endpoint management tooling (Intune, Configuration Manager, or third-party EDRs) to harvest Secure Boot and firmware metadata and correlate with vendor advisories to identify models that need firmware updates.
  • If your device is flagged as not eligible for OS-driven enrollment, consult your OEM’s support pages for a firmware update that includes the 2023 certs or vendor-specific guidance.

Strengths of Microsoft’s approach — and lingering weaknesses​

Strengths
  • Proactive and coordinated — The combined OS-side and firmware-side strategy reduces the likelihood of a widespread emergency when old certs expire. Microsoft and OEMs have prepared the replacement certs and staged the rollout to reduce operational risk.
  • Phased, telemetry-gated rollout — The safety gate reduces the chance of mass regressions on devices that lack firmware readiness. This conservative approach reflects lessons learned from earlier large-scale firmware or update rollouts.
  • Separation of signing responsibilities — Splitting bootloader and Option ROM signing into distinct certs gives firmware and platform owners finer control over trust boundaries. This is a positive security design choice.
Weaknesses / Risks
  • Complexity for legacy or locked-down environments — The combination of telemetry gating and firmware-write restrictions will put some devices in a limbo requiring manual remediation or vendor coordination, which is operationally costly for large fleets.
  • Dependence on OEM support — Where firmware updates are necessary but OEMs are out of support for a given model, organizations face hardware replacement or acceptance of reduced Secure Boot guarantees.
  • Potential for unexpected compatibility issues — Recovery media, custom boot images, and third‑party boot chains might break unless they are re-signed and tested; this is particularly acute in specialized systems and for some Linux distributions.

Bottom line and recommended next steps​

Microsoft’s Secure Boot certificate refresh is a significant but manageable platform maintenance event. For most users who apply Windows Update and OEM firmware updates, the change should be automatic and unnoticeable. For IT teams and owners of older, specialized, or air‑gapped systems, this is an operational priority: inventory devices, apply firmware updates, validate Secure Boot readiness, and test recovery images now — well before the June–October 2026 expiry windows.
Immediate checklist (concise):
  • Keep Windows Update enabled and apply the January/early‑2026 cumulative updates that contain enrollment tooling to pilot devices.
  • Inventory Secure Boot state and firmware versions across your fleet; identify models needing OEM firmware updates.
  • Test enrollment and boot-manager transitions in a controlled pilot; validate recovery media and Linux shim compatibility.
  • For systems that cannot be updated, plan for replacement or operational mitigations and coordinate with OEMs where possible.
This refresh is one of those rare maintenance events where preparation and coordination today avoid a messy, reactive race later. Treat it as a cross-team initiative: security, endpoint management, firmware/OEM support, and application owners all have a role to play to keep devices fully trusted and serviceable through 2026 and beyond.

Conclusion
Refresh the chain of trust now: apply updates, confirm firmware readiness, and validate your recovery and multi‑boot workflows. The certificate expiry windows are real and advance‑scheduled; the remediation path is available, but it requires inventory, firmware coordination, and testing to avoid degraded Secure Boot states and downstream compatibility headaches. Plan early, test broadly, and use OEM advisories and the Windows servicing updates as your operational anchors.

Source: FilmoGaz Microsoft Strengthens Secure Boot with Ongoing Windows Updates
 

Microsoft and PC OEMs are coordinating a broad, time‑sensitive replacement of the Secure Boot certificates first deployed in 2011 — the original Microsoft UEFI/KEK/PCA certificates begin expiring in June 2026 (with a remaining production PCA following later in 2026). Microsoft has issued a replacement family (the 2023 CA set) and is delivering it via a mix of Windows servicing (automatic, phased updates) and OEM firmware packages; devices that do not receive the 2023 certificates before the 2011 CAs lapse will continue to boot but will enter a degraded security state that prevents future boot‑level mitigations and updates.

Bright neon Secure Boot shield with a lock on a circuit board, symbolizing hardware security.Background / Overview​

Secure Boot is a firmware‑level trust gate built on UEFI that verifies digital signatures for pre‑OS components — the Windows Boot Manager, shim/bootloaders, option ROMs and other EFI applications. When Secure Boot is enabled, firmware consults several on‑device stores to make trust decisions:
  • PK (Platform Key) — owner/OEM controlled root of authority for the platform.
  • KEK (Key Exchange Key) — authorizes changes to the signature databases.
  • DB (Allowed Signature Database) — contains trusted signing authorities.
  • DBX (Revoked Signature Database) — contains revoked or untrusted signers.
Microsoft historically supplied a set of Microsoft‑issued CA certificates in these stores starting in 2011. Those CA certificates have a fixed validity period; when a CA in firmware expires, it can no longer vouch for newly signed boot components — and firmware that depends solely on the old CA can no longer accept future updates or revocations signed under that CA. This is the operational problem Microsoft and the OEM ecosystem are closing with the 2023 CA family.

What is expiring — precise items and timeline​

Microsoft has grouped the expiring certificates into two windows in 2026:
  • June 2026 (earlier window):
  • Microsoft Corporation KEK CA 2011 — used to sign DB/DBX updates
  • Microsoft UEFI CA 2011 — used for third‑party bootloaders and EFI apps
  • October 2026 (later window):
  • Microsoft Windows Production PCA 2011 — used to sign the Windows Boot Manager (PCA)
Microsoft replaced these with the 2023 certificate family: Microsoft Corporation KEK 2K CA 2023, Windows UEFI CA 2023, Microsoft UEFI CA 2023, and Microsoft Option ROM UEFI CA 2023 (the 2011 single UEFI CA was split into two 2023 certs to allow finer control over option ROM trust). OEM advisories sometimes publish day‑level expiration dates (for example, HP lists June 25 and June 28, 2026 for two 2011 CAs and October 20, 2026 for the PCA), so fleet planners should treat month‑level windows as canonical but consult their OEM for exact calendar deadlines per model.

Why this matters: what happens if certificates expire​

If a device does not receive the 2023 certificates before the 2011 CAs begin expiring:
  • The device will still boot and operate normally in the short term; everyday applications and standard Windows updates unrelated to early boot components will continue to function.
  • However, the device will be unable to accept future Secure Boot‑level security updates — including:
  • New Windows Boot Manager binaries signed under the new PCA.
  • DB/DBX updates (including revocations for compromised or malicious boot components).
  • New mitigations for boot‑level vulnerabilities discovered after the expiry date.
  • Over time that limitation produces a progressively degraded security posture: a platform that cannot receive DBX revocations or Boot Manager fixes is more exposed to bootkits and UEFI rootkits that operate beneath the OS.
  • Compatibility problems can also arise: newer installers, WinPE/recovery images, or third‑party pre‑boot components that are signed exclusively under the 2023 CA family may fail validation on devices still relying only on the 2011 CAs. OEMs explicitly warn that older recovery media or cloud images may need updates to continue booting reliably.
Put plainly: the immediate functional impact at expiry is limited, but the progressive inability to receive boot‑level protections and future signed updates is the operational and security risk that must be addressed before the deadlines.

How Microsoft and OEMs are deploying the 2023 certificates​

Microsoft and OEMs are using two primary delivery mechanisms in a coordinated effort:
  • Windows Update / OS servicing — Microsoft has rolled the 2023 certificates into Windows servicing packages and setup dynamic updates. January 2026 servicing and specific packages (for example, the Setup Dynamic Update for Windows 11 versions 24H2 and 25H2, released January 29, 2026) include logic to refresh boot files and stage certificate enrollment on platforms that pass readiness checks. Microsoft uses a phased, telemetry‑gated approach so the OS will only attempt automated enrollment on devices that report firmware compatibility and update health.
  • OEM pre‑installation and firmware updates — PC vendors have been shipping the 2023 certificates in UEFI firmware on new devices since 2024. OEMs (Dell, HP, Lenovo, and others) are issuing BIOS/UEFI updates for older systems so the firmware can accept OS‑driven DB/KEK writes or host the 2023 certs natively. OEM advisories list model‑level minimum BIOS revisions and publish platform lists to help administrators sequence firmware and OS updates.
Microsoft has stated that for most consumer and in‑support Windows devices, the automatic update path via Windows Update will be sufficient. For managed, offline, or specialized hardware (servers, IoT, custom images), administrators will need to follow manual deployment guidance in Microsoft’s deployment playbook.

Who is most affected — short list​

  • Enterprise‑managed fleets — especially devices that are fully controlled by WSUS or third‑party update systems, or those on slow or manually approved update cadences. IT teams must schedule certificate enrollment and firmware sequencing.
  • Servers and IoT devices — these platforms sometimes have different firmware update mechanisms or are intentionally isolated; some OEMs require model‑specific firmware updates before certificate enrollment can succeed.
  • Devices running unsupported Windows 10 without ESU — Windows 10 reached its mainstream EOL for consumer SKUs; only devices in Extended Security Update (ESU) programs may receive the 2023 certificate updates via Microsoft servicing channels. Organizations still running out‑of‑support OS images should treat this as an immediate compatibility and remediation issue.
  • Linux and alternative OS users — distributions that rely on the Microsoft‑signed shim to preserve Secure Boot compatibility will need new shims/rebuilds signed under the 2023 PCA chain. Red Hat and other distro maintainers are preparing updated shims and packages; long‑lived systems that cannot accept the new DB/KEK entries may face difficulties when updating bootloaders or kernels.
  • Gamers and anti‑cheat ecosystems — modern anti‑cheat systems often use Secure Boot attestations; vendors have warned that unsigned or unsupported certificate states can block updates for those components if the platform does not trust the new signing chain.

How to check whether your device already has the 2023 certificates​

Before you act, verify your platform state. Microsoft documents simple checks for consumers and administrators:
  • Check Secure Boot is enabled:
  • GUI: Start → Settings → Privacy & security → Windows Security → Device security → check the Secure boot section.
  • CLI: Open an elevated PowerShell and run:
  • Confirm-SecureBootUEFI (returns True if Secure Boot is enabled).
  • Inspect firmware DB/KEK entries (PowerShell):
  • Dump the DB: [System.Text.Encoding]::ASCII.GetString((Get-SecureBootUEFI db).bytes)
  • Look for the 2023 strings, e.g.: 'Windows UEFI CA 2023' or 'Microsoft Corporation KEK 2K CA 2023'
  • Quick boolean check example:
  • [System.Text.Encoding]::ASCII.GetString((Get-SecureBootUEFI db).bytes) -match 'Windows UEFI CA 2023'
    If the commands return True or contain the 2023 entries, the certificate replacement is present. Microsoft and published community guidance cite these exact commands for verification.
  • For fleet validation, run scripts from your device management tool (Intune, SCCM/ConfigMgr, or custom PowerShell) that check Confirm-SecureBootUEFI and the DB/KEK contents, then report back into compliance dashboards. Microsoft’s deployment playbook includes sample scripts and monitoring events to watch for.
If the 2023 certificates are missing, check for pending BIOS/UEFI firmware updates from your OEM, then confirm the latest Windows cumulative updates are applied. Many enrollment flows require both a firmware minimum and a specific Windows servicing baseline before the OS will attempt injection.

Step‑by‑step checklist for home users and power users​

  • Confirm Secure Boot is enabled using msinfo32 or Confirm‑SecureBootUEFI.
  • Apply all available Windows quality and cumulative updates; reboot as required.
  • Check your firmware/BIOS support page for your PC model and apply any recommended BIOS/UEFI updates before the certificate injection attempts.
  • Use the PowerShell DB/Kek checks above to confirm presence of the 2023 certs.
  • If Secure Boot is disabled (and you want it enabled), enable it in firmware only after you confirm firmware supports the 2023 CA or you have the updated boot media. Do not toggle Secure Boot lightly — toggling may trigger Secure Boot violations and require recovery media.

Playbook for IT administrators — high‑level actions​

Microsoft has published comprehensive guidance and a deployment playbook for managed environments; the short version for administrators:
  • Inventory: Identify devices with Secure Boot enabled, their firmware versions, and update eligibility.
  • Firmware sequencing: Prioritize BIOS/UEFI updates on models listed by OEMs as requiring a minimum revision to accept Microsoft‑pushed certificates.
  • Test: Validate certificate injection and boot behavior in a lab staging group before broad rollout.
  • Deploy: Use Intune, WSUS, SCCM/ConfigMgr, or your management tooling to ensure devices receive both firmware and Windows servicing updates in the correct order.
  • Monitor: Watch the Windows event logs for Secure Boot update events (Windows emits specific event IDs for DB/DBX writes and service tasks), and validate Event 1037 or similar events listed in Microsoft guidance.
  • Remediation: Prepare recovery media, document steps to restore PK/KEK/DB states, and have an out‑of‑band firmware recovery plan for models that fail automated enrollment.
For closed or isolated networks, administrators must ensure WSUS approvals and update packaging include the Secure Boot certificate updates and that OS images (recovery images, WinPE) used in provisioning are rebuilt with updated signers where required.

Known failure modes and operational cautions​

  • Secure Boot violation after a certificate swap: If firmware toggles, the DB is reset, or a boot manager binary is older than the firmware's Secure Version Number (SVN) checks, you may see a Secure Boot violation that prevents boot. Microsoft’s update packages include SVN‑based tightness for boot manager updates precisely to prevent rollback attacks; but that also means recovery media and WinPE images must be refreshed to match the new SVN. If you see such failures, prepare to use updated recovery media rather than rolling back updates.
  • Firmware incompatibility: Older firmware that refuses OS‑driven DB/KEK writes will require OEM BIOS updates or manual key enrollment; devices out of vendor support may be effectively unable to accept the new certificates without vendor intervention. OEM advisories list models that will not receive BIOS updates.
  • Linux/shim incompatibility: Distributions using the Microsoft‑signed shim will need new shims signed under the updated chain. Expect distro updates (shims) to be pushed before or shortly after the expiry window; long‑running appliances that cannot accept the new certs may need to disable Secure Boot or perform manual enrollment (with the usual security implications).
  • Anti‑cheat and anti‑tamper software: Services that rely on Secure Boot attestations may require updated drivers or signed components compatible with the 2023 CA family. Gamers and service providers should ensure anti‑cheat vendors have released updates and that platform registries reflect the change.
Important operational note: the most common safe path is to make sure firmware is up to date, apply Microsoft servicing updates, and avoid toggling Secure Boot or resetting DB/KEK without following vendor recovery procedures.

Critical analysis — strengths and risks of the current approach​

Strengths
  • Proactive coordination: Microsoft’s decision to pre‑issue the 2023 CA family and to deliver them via both OS servicing and OEM firmware minimizes the number of devices requiring out‑of‑band manual fixes. The phased, telemetry‑gated enrollment is a sensible risk mitigation step to reduce mass regressions.
  • Finer granularity of trust: Splitting the single UEFI CA into separate loader and option ROM CAs in the 2023 set reduces lateral trust expansion and gives administrators stricter control over what they accept in the pre‑OS environment.
  • OEM engagement: Major OEMs publishing model lists and firmware timelines helps enterprise planners sequence updates without guessing per‑model behavior.
Risks and weaknesses
  • Firmware fragmentation: The UEFI ecosystem remains fragmented; many older platforms are out of support and will not accept OS‑driven KEK/DB writes. That fragmentation leaves a non‑trivial population of devices that require manual enrollment or remain in an insecure state. OEM‑level patching timelines vary considerably by model.
  • Complexity for closed environments: Enterprises with locked‑down update approvals, air‑gapped segmentation, or custom images must plan and test carefully — the risk of image or recovery media becoming unbootable under the new SVN/Boot Manager rules is real. Microsoft’s tooling helps, but administrators must do the heavy lifting.
  • Potential for end‑user confusion: Consumers may see “Secure Boot violation” errors during the transition if recovery media are older or if OEM firmware does not match Microsoft’s expectations; without clear step‑by‑step manufacturer instructions, help desks could face a spike in support tickets.
  • Non‑Windows ecosystems: Linux distributions and other OS vendors must coordinate shim rebuilds and re‑signings — any delay increases the risk that some users will need to disable Secure Boot (with security tradeoffs) or follow error‑prone manual enrollment steps.
Bottom line: this is a technically sound, necessary effort that reduces a long‑term security liability, but the operational risk surface is firmware heterogeneity and the sequencing of firmware and OS updates across millions of platforms.

Practical recommendations — what to do today (ordered)​

  • Apply Windows updates — install the latest monthly cumulative updates and Setup Dynamic Updates on all in‑support Windows devices.
  • Update firmware — check OEM support pages and update BIOS/UEFI to the minimum revisions listed for each model.
  • Verify — run Confirm‑SecureBootUEFI and the PowerShell DB/KEK inspections to confirm presence of the 2023 certificates.
  • Test recovery media — refresh WinPE and recovery media images using updated tooling and test them on a staging device after certificates and SVN updates have been applied.
  • Inventory and schedule — for enterprises, inventory Secure Boot status and BIOS revision levels; sequence firmware updates then OS servicing during approved maintenance windows.
  • Monitor — watch the Windows event log entries and Microsoft’s guidance pages; build alerts for Secure Boot update events during rollout.

Looking ahead​

This certificate refresh is one of the largest coordinated, calendar‑driven maintenance actions affecting the Windows ecosystem in years. Done right, the 2023 CA family extends Secure Boot’s viability and gives OS and firmware vendors a modern trust anchor for the next generation of mitigations. But success depends on orderly firmware sequencing, thorough testing of recovery media and images, and close communications between Microsoft, OEMs, and independent OS vendors.
Administrators should treat the June–October 2026 window as a hard operational milestone: prioritize inventory and firmware updates today rather than reacting after expirations begin. For consumers and small businesses, the simplest safe path is to keep devices updated (Windows Update + OEM BIOS updates) and avoid disabling Secure Boot or using stale recovery media.
Microsoft’s documentation and OEM advisories provide the procedural details administrators need; if you manage fleets, follow Microsoft’s Secure Boot playbook and your OEM guidance to avoid unpleasant surprises.

Final checklist — ready-to-execute actions (short)​

  • Confirm Secure Boot is On (msinfo32 / Confirm‑SecureBootUEFI).
  • Apply latest Windows cumulative updates (including Setup Dynamic Update payloads).
  • Update BIOS/UEFI to OEM‑recommended minimum revision and confirm support for 2023 cert write.
  • Verify 2023 certs in DB/KEK with PowerShell DB dump (search strings: "Windows UEFI CA 2023", "Microsoft Corporation KEK 2K CA 2023").
  • Refresh and validate recovery/WinPE images against the updated Boot Manager/SVN.

This transition is actionable and fixable — but only if it is treated as a maintenance project rather than as background housekeeping. Update firmware, apply servicing, verify certificate presence, and test recovery paths now; doing so will keep your devices able to receive new boot‑level protections well beyond the 2011 certificate expiry window.

Source: H2S Media Windows Secure Boot Certificates Expiring June 2026: What You Need to Know
 

Microsoft’s warning that some Windows PCs will enter a “degraded security state” unless they receive updated Secure Boot certificates is not marketing fearmongering — it’s a technical deadline with practical consequences, and it demands action now from IT teams and home users alike.

Neon Secure Boot shield over a motherboard, showing CA statuses: 2011 expired and 2023 renewing.Background / Overview​

Secure Boot is a firmware-level integrity gate built into UEFI that prevents unsigned or tampered software from running before the operating system loads. Put simply, Secure Boot checks the cryptographic signatures of the bootloader, option ROMs and other pre‑OS components against a small set of trusted certificates stored in firmware. If those trust anchors are stale or expired, the firmware can still boot — but it loses the ability to accept new signed components or apply future Secure Boot updates reliably. That is the core of the problem Microsoft is trying to fix.
The original Microsoft Secure Boot certificates were issued in 2011 when Secure Boot first shipped broadly with Windows 8. After roughly 15 years of use, the cryptographic lifecycle for those certificates is now drawing to a close: Microsoft’s documentation and blog posts make clear that the 2011 certificate authorities (CAs) begin expiring in June 2026 and that the final expirations complete by October 2026. Microsoft and its OEM partners shipped replacement 2023 certificates and are deploying them via Windows updates and firmware updates to preserve Secure Boot continuity.
Why this matters right now: devices that still rely solely on the 2011 CAs after the expiry window will not be able to receive future boot‑level mitigations and revocations (DBX updates), and will therefore be progressively less protected against bootkits and pre‑OS attacks. Microsoft calls that condition a “degraded security state.” The device will usually still boot and run, but critical defenses for the earliest stages of startup will be impaired.

What Microsoft is doing — the “generational refresh”​

Microsoft’s remediation plan is a coordinated “generational refresh” of the Secure Boot certificates:
  • New 2023 CA certificates were created to replace the 2011 CAs (for example, Microsoft Corporation KEK 2K CA 2023, Windows UEFI CA 2023, and Microsoft UEFI CA 2023 / Microsoft Option ROM UEFI CA 2023). These separate certain signing roles (bootloader vs option ROMs) for finer trust control.
  • Microsoft is distributing OS‑side enrollment logic and the capability to write the new certificates into firmware variables through Windows servicing updates. For most modern consumer devices this is being carried out automatically as part of controlled, phased rollouts; many devices shipped in 2024–2025 already include the 2023 certs in firmware.
  • For devices that won’t accept an OS‑side enrollment (for example, air‑gapped systems, certain VMs, or platforms where firmware must be updated by an OEM), Microsoft is working with OEM partners to deliver firmware/BIOS updates that provision the new certificates. Some older devices may never receive those firmware updates if the OEM has ended support.
  • Microsoft published detailed guidance and administrative tooling for IT professionals — including PowerShell checks, registry flags, event IDs to monitor, and deployment playbooks — so organizations can inventory, test, and update fleets safely.
These moves are intended to avoid a sudden halting of Secure Boot operations; instead, Microsoft’s staged approach tries to ensure most devices transition quietly. But the work is not entirely automatic or unconditional — and that’s the critical nuance that concerns Windows 10 users in particular.

Why Windows 10 users are singled out (and what “degraded security state” practically means)​

Microsoft’s rollout prioritizes devices that continue to receive Windows platform servicing. Windows 11 machines that are on supported servicing branches are the primary recipients of the automated enrollment path; most Windows 11 owners should receive the certificates with no additional action required. For Windows 10 the picture is more complex:
  • Windows 10 mainstream support ended on October 14, 2025. Microsoft will still distribute these Secure Boot certificate updates to Windows 10 devices that are enrolled in the Consumer Extended Security Updates (ESU) program or otherwise on supported servicing paths, but devices that are simply left on unsupported Windows 10 editions and not enrolled in ESU will not be on the same automated update path. That increases the risk that those devices will still be trusting the expiring 2011 CAs when the expiry window arrives.
  • A device in the degraded state will still start and most everyday features will work, but it will not be able to receive new Secure Boot protections — including DBX revocations and boot‑manager fixes. That eliminates a key line of defence at the earliest execution stage. Components relying on Microsoft’s Secure Boot trust (for example, BitLocker hardening enhancements, some third‑party bootloaders, and anti‑cheat drivers used by modern games) may also fail to update or receive new validations. Over time this increases attack surface for bootkits like BlackLotus and similar threats.
  • In short: “It still boots, but it’s less defendable.” That is the operational reality Microsoft is warning about.
For Windows 10 users who want to keep the OS longer, Microsoft’s Consumer ESU program is the explicit bridge — but it is temporary and feature‑limited. It extends security patches (for eligible Windows 10 22H2 devices) through October 13, 2026, but it does not restore mainstream support or guarantee OEM firmware updates for older hardware. If your device can’t receive the OS‑side update and the OEM won’t publish firmware updates, enrollment in ESU may delay but not fully eliminate the hardware-level problem.

Technical deep dive: certificates, KEK, DB, DBX — what to watch for​

If you manage Windows hardware or just like to know how the sausage is made, here’s what the Secure Boot architecture uses and what changes with the 2023 CAs:
  • PK (Platform Key): controlled by the OEM; authorizes changes to KEK.
  • KEK (Key Exchange Key): a set of keys that authorize updates to the DB and DBX. The Microsoft KEK CA 2011 is being replaced by the Microsoft Corporation KEK 2K CA 2023. If a device lacks the new KEK, Microsoft cannot sign future DB/DBX updates for that device.
  • DB (Signature Database): contains allowed signatures — bootloaders and other trusted binaries. Microsoft is replacing the Windows Production PCA 2011 with a 2023 Windows UEFI CA so new bootloaders signed under 2023 can be trusted.
  • DBX (Revoked Signature Database): contains signatures that must not be trusted; Microsoft updates DBX to revoke compromised components. Devices that cannot accept DBX updates after CA expiry lose Microsoft’s ability to revoke malicious pre‑OS code.
Practical signals and logs IT teams should monitor: Event IDs and registry servicing keys that Microsoft has documented (for example Event IDs 1801/1808 and the Servicing registry keys such as WindowsUEFICA2023Capable, UEFICA2023Status). These indicate whether an update is pending, applied, or errored and are essential for large‑scale troubleshooting. Microsoft provides scripts and sample automation for inventory and monitoring.

Who is affected — the compatibility and support cliff​

Not every Windows PC needs manual intervention — many modern devices will receive the update automatically. But expect these exceptions:
  • Older models where OEMs have stopped publishing firmware updates. Those devices may never receive the option ROM/KEK/DB writes required to add the 2023 certs. In these cases, the device either needs a manual firmware provisioning path (rare) or hardware replacement.
  • Servers, industrial IoT, and embedded machines with locked or vendor‑specific UEFI where firmware updates must be coordinated with specialized suppliers. These often require vendor intervention and testing.
  • Virtual machines or hypervisor configurations where UEFI variables are emulated; certain virtualization setups need special handling because the OS‑side task that applies the new certificates can fail on some VM hosts. Microsoft has documented Hyper‑V and VM-specific guidance and added troubleshooting for event‑driven failures.
  • Machines with Secure Boot intentionally disabled; those systems will not receive the certificate upgrades because the OS‑side path assumes Secure Boot is active. Disabling Secure Boot to “work around” the problem is a dangerous tradeoff and not recommended.
A practical note for gamers: anti‑cheat stacks used by top titles depend on Secure Boot integrity for some of their protections. If your machine cannot receive the 2023 certs, you may see compatibility or update issues with EAC, Vanguard, Ricochet, and similar systems that integrate with early boot protections. That’s one concrete example of functionality that can degrade even if Windows still boots normally.

What you should do now — practical, prioritized guidance​

Below is a prioritized checklist that applies to both home users and IT teams. Follow these steps in order:
  • Inventory and backup
  • Inventory every device: model, BIOS/UEFI version, Windows build, Secure Boot state. For fleets, export data via management tools. Back up critical data and ensure BitLocker recovery keys are stored in a secure, accessible location.
  • Confirm Secure Boot status and certificate presence
  • Check Secure Boot: open an elevated PowerShell and run Confirm‑SecureBootUEFI — it should return True if Secure Boot is on. If Secure Boot is off you don’t get the same OS‑side update path and should evaluate whether enabling Secure Boot is possible and safe for your workload.
  • Verify 2023 certs exist: use Microsoft’s recommended PowerShell checks or registry keys. For example, use the Get‑SecureBootUEFI commands or the registry key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecureBoot\Servicing values (WindowsUEFICA2023Capable, UEFICA2023Status) to confirm. If you prefer, Microsoft supplies scripts to scan fleets and emit a clear True/False for “UEFICA2023 present.”
  • Update Windows and firmware now
  • Install the latest cumulative updates (many of the 2023 certificate components shipped in earlier LCUs such as KB packages beginning in 2025), then check for BIOS/UEFI firmware updates from your OEM. If a vendor offers a firmware package that mentions Secure Boot or UEFI CA updates, treat it as high priority.
  • Enroll in Consumer ESU if you must stay on Windows 10
  • If your device is Windows 10 and you cannot upgrade, enroll in Consumer ESU by October 13, 2026. Enrollment options include linking a Microsoft account, redeeming Microsoft Rewards, or a one‑time $30 purchase for eligible devices. ESU provides critical security updates but is strictly temporary and does not guarantee firmware support from OEMs. Plan to migrate off ESU before it ends.
  • Pilot and stage updates for fleets
  • For enterprises, run a small representative pilot across models and BIOS versions. Monitor Event IDs and the registry servicing keys Microsoft documents, and coordinate remediation plans with OEM support for models that fail the OS‑side enrollment.
  • Avoid unsafe workarounds
  • Do not disable Secure Boot to “get around” certificate expiry. That trades the current risk for a much larger one and can break BitLocker and other protections. Likewise, be cautious about unofficial “Windows 11 bypass” hacks or third‑party patches on unsupported machines — they may prevent official updates or create instability.

Step‑by‑step checks (quick reference)​

  • Confirm Secure Boot: Open PowerShell (Admin) → Confirm‑SecureBootUEFI. True = Secure Boot on.
  • Quick DB/KEK probe: Run Microsoft’s sample PowerShell checks or use the Get‑SecureBootUEFI KEK/DB commands and search the output for “Windows UEFI CA 2023” or “Microsoft Corporation KEK 2K CA 2023.” Microsoft documents these commands and provides example scripts for fleet use.
  • Check registry servicing keys: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecureBoot\Servicing — look for WindowsUEFICA2023Capable, UEFICA2023Status, and UEFICA2023Error.
  • Monitor event log IDs 1801/1808 for update failures.

Risks, edge cases and what can go wrong​

  • Firmware write failures: UEFI implementations vary. Writes to KEK/DB variables can fail if firmware restricts writes, if the platform has buggy UEFI, or if BitLocker intervenes. A failed update can require OEM remediation or recovery operations, including BitLocker key entry. Make sure recovery keys are accessible before mass rollout.
  • Telemetry gating and “health” filters: Microsoft’s automated enrollment uses confidence‑based gating that depends on telemetry signals. Machines configured to block telemetry, or systems in sensitive environments (air‑gapped, regulatory constraints), may be excluded from the automated path and need manual handling.
  • Unsupported hardware: some devices will never receive OEM firmware updates. For these, organizations must decide between replacing hardware, accepting a reduced boot‑security posture, or isolating and compensating with network and endpoint controls. There’s no perfect technical fix in every case.
  • Virtual machines and nested hypervisors: certain VM hosts show enrollment failures that are distinct from physical firmware issues; follow Microsoft’s VM‑specific guidance and monitor the Hyper‑V/VM event logs.

The-hard truth: timelines and strategic decisions​

This is not an injunction to panic‑replace every PC immediately. Many modern devices will be updated automatically with negligible disruption. But the calendar creates an irreversible risk profile: by June–October 2026 the old 2011 CAs are expiring. Devices that miss the enrollment window will not stop working, but they will lose the ability to receive future early‑boot mitigations — and that is the operational reality behind Microsoft’s “degraded security state” language. Treat the window as a security compliance deadline.
For large organizations that still have Windows 10 fleets, ESU buys time but not outcomes: ESU extends update delivery for a year, but firmware remediation and OEM cooperation remain necessary. Plan hardware refreshes where OEM updates are not possible, and prioritize internet‑facing, sensitive, or regulated endpoints first.

Final analysis — strengths, shortcomings and a clear recommendation​

Microsoft’s approach has strengths: the company published technical guidance, created updated CAs that separate bootloader and option ROM trust, and provided OS‑side automation to reach a large percentage of consumer devices without manual BIOS flashes. That reduces the immediate blast radius of a cryptographic lifecycle problem that would otherwise become chaotic. The vendor/OEM coordination and the availability of PowerShell tooling for inventory and monitoring are practical, professional steps.
However, the plan also exposes realistic risks:
  • The reliance on firmware updates and OEM support means a support gap for older hardware — there will be real devices that cannot be updated.
  • Automated gating that depends on telemetry is operationally sensible, but it excludes offline and privacy‑conscious environments unless admins actively manage exceptions.
  • Windows 10 users who decline ESU or who are on unsupported builds are at heightened risk; ESU itself is a one‑year bridge and not a permanent solution.
Recommendation (clear and simple):
  • If your PC is eligible for Windows 11 and you value long‑term security and easier lifecycle management, upgrade to Windows 11 at your earliest convenience.
  • If you must remain on Windows 10 temporarily, enroll in Consumer ESU (if eligible) and separately ensure your firmware is updated by the OEM — ESU alone does not guarantee firmware writes.
  • For IT teams: inventory, pilot, coordinate with OEMs, and prioritize endpoints by risk. Don’t wait for June 2026 to start this work.

Secure Boot certificate expiration is one of those quiet technical deadlines that can silently erode security posture if ignored. Microsoft has given clear guidance and tools; the remaining work is execution: inventory your estate, apply the updates Microsoft and your OEMs provide, or accept the tradeoffs and plan a path to replacement. If there’s one takeaway for Windows 10 holdouts, it is this: your machine may still boot tomorrow, but without the refreshed trust anchors you are betting that nothing new will be discovered in the pre‑OS attack surface. That’s a bet you should evaluate with clear inventory data, a tested recovery plan and a timeline to a supported platform.

Source: Tom's Guide https://www.tomsguide.com/computing...-state-as-microsoft-ends-secure-boot-support/
 

Microsoft is rolling out a coordinated refresh of the Secure Boot certificates that have anchored Windows boot security since 2011, and if you run Windows on older hardware you should treat this as a time‑sensitive maintenance event: new 2023 certificate authorities will be injected through Windows servicing and OEM firmware updates to replace expiring 2011 roots that begin lapsing in June 2026 (with a final Windows boot‑signing PCA expiring in October 2026).

Blue isometric laptop with a Secure Boot shield amid firmware and calendar icons.Background / Overview​

Secure Boot is a UEFI firmware mechanism designed to ensure that only cryptographically signed, trusted code runs before the operating system loads. It enforces a chain of trust stored in a few protected UEFI variables—PK (Platform Key), KEK (Key Exchange Key), DB (allowed signatures), and DBX (revoked signatures)—and those stores are anchored by X.509 certificate authorities (CAs). Over the past decade Microsoft supplied a common set of Microsoft-issuws devices carried in firmware; those CAs were intentionally long‑lived but they are not eternal.
The problem is calendar‑driven: certificates have explicit expiration dates, and several of the Microsoft‑supplied 2011 CAs begin to expire in mid‑2026. Without replacement, devices that still rely on those expired certificates will still boot and run, but they will enter a degraded security state—they cannot accept future Secure Boot database updates, revocations, or new boot‑level mitigations signed with tat progressively widens the attack surface for boot‑level threats and can create compatibility failures with newly signed boot managers, drivers, anti‑cheat systems, virtual machine trust chains, and other Secure Boot‑dependent software.

What exactly is expiring, and when​

Microsoft has published a concise mapping of the expiring 2011 certificates and the new 2023 replacements:
  • Microsoft Corporation KEK CA 2011 — expires June 2026. Replacement: Microsoft Corporation KEK 2K CA 2023 (used to sign DB and DBX updates).
  • Microsoft Corporation UEFI CA 2011 — expires June 2026. Replacement: Microsoft UEFI CA 2023 and Microsoft Option ROM UEFI CA 2023 (the single 2011 UEFI CA is split into two 2023 CAs to separate bootloader signing from option ROM signing).
  • Microsoft Windows Production PCA 2011 — expires October 2026. Replacement: Windows UEFI CA 2023 (used to sign the Windows Boot Manager).
OEM vendor advisories and Microsoft KBs show day‑level expirations vary slightly by vendor documentation, but the canonical windows‑level guidance groups e*June 2026 and October 2026** windows. Vendors such as Dell and HP are publishing model‑level guidance that lists exact dates and per‑model BIOS/UEFI minimums.

How Microsoft and OEMs are delivering the fix​

Microsoft and OEM partners are using a two‑pronged approach:
  • Windows‑side servicing: Microsoft packaged the enrollment logic and payloads for the 2023 certificates into cumulative updates beginning in late 2025 / early 2026 (for example, January 13, 2026’s KB5074109 contains device targeting and enrollment logic). Windows Update will attempt to write the new certificates into firmware variables on eligible systems where firmware permits OS‑side writes. Microsoft is performing the rollout in a staged, telemetry‑gated manner—devices that demonstrate reliable update signals will be prioritized to limit the risk of mass regression.
  • OEM firmware updates: Where firmware does not permit OS‑side enrollment or where KEK provisioning is required, OEMs are shipping BIOS/UEFI updates that include the new 2023 CAs in firmware. Vendors have been shipping devices from 2024 onward with the 2023 certificates built in, and they are releasing firmware updates for in‑field devices to add the new certificates as well. Dell, HP, Lenovo and other OEMs have published KBs and scripts for server platforms to perform certificate injection when required.
Microsoft’s published guidance emphasizes that while most consumer and managed devices will be updated automatically if kept current, a fraction of devices—particularly air‑gapped machines, regulated aems, old servers or EOL hardware, and some DIY motherboards—may require manual BIOS updates, vendor tooling or IT workflows.

Why this matters — practical consequences​

This change is not an abstract certificate housekeeping task; it affects real security and compatibility vectors:
  • Loss of future boot‑level mitigations: If a device still trusts only expired 2011 CAs, Microsoft cannot deliver DBX revocations or bootloader fixes that rely on the new CAs. That means newly discovered boot vulnerabilities cannot be fixed via Secure Boot updates on that device.
  • Anti‑cheat and game compatibility: Many modern anti‑cheat stacks (for example, kernel integrity checks that depend on Secure Boot guarantees) may be impacted if a platform’s Secure Boot trust anchors are not updated. Gamers and competitive platforms should therefore keep systems updated to avoid unexpected failures.
  • BitLocker and recovery prompts: Firmware changes, BIOS resets, or poorly applied certificate operations can trigger BitLocker recovery prompts on some machines. Administrators must sequence certificate enrollments carefully in environments using disk encryption.
  • Server and enterprise impact: Servers, virtualization hosts, and air‑gapped appliances often have manual update processes and changed telemetry profiles. Vendors such as Dell have provided scripts and step‑by‑step guidelines for server platforms to perform certificate injection and verify KEK/DB/DBX contents. Failing to act on supported server platforms could lead to inability to receive future Secure Boot updates or unexpected boot behavior if defaults are reset.
  • No immediate bricking, but progressive degradation: Importantly, devices xpire will usually still boot and run normal code signed under existing signatures. The urgent risk is serviceability and future protection rather than immediate mass bricking. That said, aging firmware or mismatched updates can still create localized boot failures—so careful testing is required.

What to do now — concrete actions for consumers​

If you manage a single PC or a handful of devices, the remediation path is straightforward but requires attention:
  • Keep Windows updated. Install cumulative updates (for example, the January 2026 updates that include enrollment targeting) so your system receives the OS‑side logic that can enroll new certificates. Microsoft has gated rollout by device health; staying current maximizes your chance of automatic enrollment.
  • Update your PC’s firmware (BIOS/UEFI). Check your OEM’s support site or system update tool and install any UEFI updates labeled to include the 2023 Secure Boot certificates. OEM advisories explicitly recommend firmware updates when indicated. For laptops and desktops from large vendors, BIOS updates for many models were distributed during 2024–2025 and continue through 2026.
  • Verify Secure Boot and certificate contents (optional but recommended for power users). On Windows you can inspect UEFI Secure Boot variables usin tooling to confirm KEK, DB and DBX entries. Microsoft documentation and OEM KBs provide scripts and commands for verification.
  • Avoid resetting UEFI defaults during the transition. Resetting Secure Boot keys or toggling Secure Boot off/on can cause the platform to reinitialize keys and may produce BitLocker recovery prompts. If you need to change firmware settings, suspend BitLocker first and follow vendor guidance.
  • If you run an older, DIY motherboard, check the manufacturer’s BIOS release notes. Some older boards may not accept OS‑driven DB/KEK writes and will require a BIOS update from the vendor. If the vendor no longer produces updates for the model, consider hardware replacement before the June/October 2026 windows.

What to do now — guidance for IT administrators and enterprise teams​

For ot be treated as a cross‑discipline project (security, endpoint, firmware & procurement). Follow a measured plan:
  • Inventory: Identify Secure Boot–enabled devices, track current KEK/DB/DBX contents, and classify devices that are air‑gapped, on custom images, or have restricted telemetry. Microsoft and OEM advisories include tools and PowerShell samples to help inventory firmware variables.
  • Pilot: Test enrollment workflows on a pilot group. Validate that enrollment via Windows Update works for your hardware models, and test firmware updates where required. Include recovery and BitLocker workflows in tests.
  • Sequence firmware updates: Coordinate BIOS/UEFI updates from OEMs before pushing OS‑side certificate enrollments when required. Some platforms require vendor KEK additions or special ordering to ensure a smooth trust anchor transition. Vendor KBs (for example Dell’s server procedures) include scripted methods and verification commands.
  • Use Microsoft’s enterprise controls when needed: Microsoft offers registry, Group Policy, WinCS/PowerShell tooling and Intune guidance to control enrollment behavior (opt‑in, opt‑out, or force enrollment) for managed fleets. Use these to coordinate staged deployments and to avoid surprise behavior on mission‑critical systems.
  • Plan for exceptions: For air‑gapped, embargoed, or regulators‑restricted systems create manual remediation playbooks and coordinate directly with OEM account teams for signed firmware packages or assistance. Microsoft’s Secure Boot playbook and vendor advisories provide recommended workflows.

Step‑by‑step: a concise admin checklist​

  • Export inventorersions, mark Secure Boot status.
  • Identify devices with no telemetry or that are air‑gapped; plan manual remediation.
  • Pilot the Microsoft‑managed enrollment on a representative set of models.
  • Sequence per‑model firmware updates from OEMs where required.
  • Verify KEK/DB/DBX contents post‑update with vendor scripts or PowerShell.
  • Re‑enable BitLocker protection and confirm recovery keys are accessible.
  • Monitor telemetry and vendor bulletins for late edge‑case BIOS fixes.

Strengths of Microsoft’s approach​

  • Proactive and collaborative: Microsoft coordinated with OEMs to prepare 2023 certificates and to include thped since 2024. Working with vendors ahead of the expiry window reduces last‑minute emergency updates.
  • Dual delivery model: Combining OS‑side enrollment with firmware updates covers a broader range of hardware and reduces manual intervention where firmware already permits OS writes.
  • Telemetry‑gated rollout: Gradual targeting lowers mass‑regression risk by prioritizing devices with healthy update histories, which is a cautious approach for a change that touches firmware and boot chains.
  • Vendor toolkits and scripts: OEMs have published practical scripts and verification tools (notably for server fleets), making enterprise remediation practical and automatable.

Risks, limitations, and things to watch​

  • Firmware heterogeneity: Millions of unique device configurations mean there is still a measurable chance of device‑specifiexplicitly warns a fraction of devices will require third‑party intervention—this includes older boards that do not accept OS‑driven KEK updates.
  • Update regressions: The January 2026 servicing that introduced certificate enrollment logic coincided with other changes and has been linked to some update‑related stability problems (e.g., peripheral/driver regressions reported by users). While the certification rollout is separate from those issues, it demonstrates the risk of complex update interactions and underscores the need for pilots.
  • Air‑gapped and regulated environments: Systems with telemetry disabled or strict change control will need manual workflows. These environments are precisely where boot‑level protections are most valued—so planners must not ignore them.
  • End‑of‑life hardware: Vendors will not be able to add 2023 certificates to firmware for devices that have reached end‑of‑service; those systems should be replaced or isolated before the expiry windows. Dell and others have published lists of unsupported generation platforms.
  • Human factors and BitLocker: Mishandling of firmware defaults or failure to suspend/re‑enable BitLocker can lock users out. Clear procedural checklists and backups of recovery keys are essential.

A realistic timeline and expectations​

  • Devices built and shipped from 2024 onward commonly include the 2023 certificates in firmware and will generally be unaffected by the June/October 2026 windows if kept updated.
  • For existing in‑field devices, Microsoft’s telemetry‑gated Windows Update enrollment has been rolling out since late 2025 and into 2026. Administrators should treat the June 2026 window as the first critical deadline—certificates that expire then block future Secure Boot updates unless replaced. The October 2026 date affects the Windows Boot Manager signing PCA.
  • If you haven’t started remediation planning, begin now: inventory, pilot, sequence firmware updates, and communicate to stakeholders. This is an ecosystem task, not a single‑patch job.

Final verdict — what readers should take away​

This Secure Boot certificate refresh is one of the largest cross‑industry security maintenance efforts in the Windows ecosystem in recent memory. The good news is that Microsoft, together with major OEMs, has prepared both the new certificate family and multiple delivery methods to address the expiry. For the vast majority of users who keep Windows and firmware current, the transition will be automatic and invisible.
However, the rollout is not risk‑free. Administrators, power users, gamers using anti‑cheat‑sensitive platforms, and owners of older or air‑gapped systems must take proactive steps: inventory devices, apply vendor‑supplied BIOS updates where required, pilot Microsoft’s enrollment process on representative hardware, and ensure BitLocker recovery workflows are in place. Treat the June–October 2026 windows as operational deadlines: without the 2023 certificates in firmware, affected systems will gradually lose the ability to receive boot‑level protections and may face compatibility issues with newly signed components.
If there’s a single, practical action: install the latest Windows cumulative updates and check your OEM’s support pages for any BIOS/UEFI updates flagged for Secure Boot certificates—doing so now avoids last‑minute emergency fixes and maintains the integrity of the platform’s earliest trust anchor.

Conclusion
This certificate refresh preserves a cornerstone of Windows platform security—Secure Boot—but it also exposes a perennial truth of modern computing: cryptography and trust anchors must be actively managed. The transition will succeed only if vendors, IT teams, and end users coordinate, verify, and act before those 2011 certificates lapse. Start your inventory and testing now; the months ahead are the window to move from risk to resilience.

Source: TweakTown Microsoft is refreshing Secure Boot certificates, so you might need to update Windows
 

If your PC boots with Secure Boot turned on, there’s a maintenance deadline this year: the Microsoft-supplied Secure Boot certificates that have guarded Windows startup since 2011 are being replaced, and some of those original certificates begin expiring in June 2026 (with the remaining ones set to expire by October 2026).

Neon Secure Boot shield glows above a Windows-themed circuit-board motherboard.Background​

Secure Boot arrived with UEFI and Windows 8 as a low-level, behind-the-scenes guard that checks signatures on bootloaders and other early startup components. For more than a decade Windows devices relied on the same three Microsoft-supplied certificates to validate that the code loaded before the operating system was trustworthy. Those certificates are approaching the end of their planned lifecycle.
Microsoft and PC OEMs are rolling out 2023-era replacement certificates so Secure Boot can continue to receive updates and sign new boot-time components going forward. For most fully patched Windows systems with Secure Boot enabled, the swap to the new certificates is being handled automatically through Windows Update or firmware updates — but not every device will get the update seamlessly. If your machine doesn’t pick up the new certs before the old ones expire, it won’t stop working immediately, but it will enter a degraded security and serviceability state that will grow worse over time.

What exactly is changing?​

At a technical level, Microsoft is rotating several certificate authorities used by Secure Boot:
  • KEK (Key Exchange Key): the certificate that enables updates to the DB and DBX (the databases used to manage trusted and revoked signatures).
  • DB (Database): contains certificates used to verify allowed bootloaders and EFI binaries.
  • DBX (Revoked database): contains revoked signatures.
The old Microsoft certificates (commonly referenced as the 2011 CAs) are being replaced by newer 2023 CA certificates. The change breaks down like this:
  • Some Microsoft CA certificates expire in June 2026 (KEK and some UEFI CA entries).
  • The remaining certificate that signs the Windows boot manager is scheduled to expire in October 2026.
Those months are the hard deadlines to keep in mind: once the 2011 CA entries are expired and not replaced on a device, Microsoft can no longer issue updates to pre-boot components for that device, and new boot-level mitigations will not be installable via the usual Secure Boot DB update path.

Who’s affected and who is not​

  • Most modern PCs running supported versions of Windows and receiving regular Windows Updates should be unaffected: Microsoft is deploying new certs through Windows Update, and many devices built since 2024 (and most shipped in 2025) already include the 2023 certificates in firmware or have picked them up automatically.
  • Older hardware or machines with outdated firmware may require a BIOS/UEFI update from the OEM, or in some cases manual intervention.
  • Windows 11 devices running supported releases (for example, 24H2 or 25H2) are in scope for Microsoft’s in-place automatic deployment process.
  • Windows 10 clients that are not enrolled in Extended Security Updates (ESU) will not receive Microsoft updates and therefore will not be pushed the replacement certs unless the organization has a separate device-management path; consumers on unsupported Windows 10 are at greater risk.
  • Linux and dual-boot systems that rely on the Microsoft-signed shim or rely on Secure Boot to validate custom kernels may need updated shims signed by the new CA; several Linux vendors are preparing or already releasing updated shims.
  • Virtual machines and unusual firmware stacks can behave differently — Hyper‑V and other hypervisors have known corner cases to watch for during the rollout.

Why this matters: the practical impact​

At first glance, expired boot certificates do not instantly brick your PC. Existing, signed code will continue to boot immediately after the certificate expiration. But there are important, concrete consequences:
  • No new pre-boot security fixes: Once a device no longer trusts a Microsoft-managed CA, Microsoft cannot update the device’s Secure Boot DB to block or mitigate new boot-level vulnerabilities using the usual signed updates. That reduces the device’s ability to receive new boot-protections.
  • Growing exposure over time: As vulnerabilities are discovered, devices stuck on the old CA will be unable to receive protective updates that rely on the new CA, increasing long-term risk.
  • Compatibility issues: Future operating systems, bootloaders, option ROMs, or third‑party EFI apps that require the new 2023 certificate may fail to load on devices that never receive it.
  • Enterprise compliance: For businesses required to keep devices within a defined security profile, machines that miss the update may fail compliance checks.
  • Dual-boot and custom-signing fragility: Environments that rely on custom-signed binaries (custom kernels, signed bootloaders, or vendor-supplied shim binaries) may need to re-sign or update these components under the new CA chain.

How to check your PC — quick, authoritative tests​

You can confirm whether the new Windows UEFI CA 2023 certificate is present using PowerShell. Open PowerShell or Terminal as Administrator and run the following checks.
  • Check whether the installed DB contains the new certificate:
([System.Text.Encoding]::ASCII.GetString((Get-SecureBootUEFI db).bytes) -match 'Windows UEFI CA 2023')
  • Returns True: the new certificate is present in the active DB.
  • Returns False: the active DB does not contain the 2023 certificate.
  • Check whether the default DB baked into firmware contains the new certificate:
([System.Text.Encoding]::ASCII.GetString((Get-SecureBootUEFI dbdefault).bytes) -match 'Windows UEFI CA 2023')
  • Returns True: the new certificate is embedded in firmware and will survive a factory reset of Secure Boot keys.
  • Returns False: firmware does not include the new certificate; a firmware/BIOS update may be required or Windows Update must write the new certificate into NVRAM.
  • Confirm Secure Boot is enabled:
  • Press Windows + R, type msinfo32 and press Enter, then check that Secure Boot State reads “On”.
  • Or run PowerShell as Administrator and use Confirm-SecureBootUEFI (should return True).
If these checks return favorable results, you are likely good. If not, read on — there are practical steps to remediate most failures.

Step-by-step remediation: what to do if you’re not ready​

Follow this checklist in order; most users will be restored by the first few steps.
  • Confirm you’re on a supported Windows build.
  • For Windows 11: be on a supported servicing channel (for example, 24H2 or 25H2 at the time of this notice).
  • For Windows 10: you must be enrolled in Extended Security Updates (ESU) to receive the relevant updates.
  • Install the latest cumulative Windows Updates.
  • Microsoft is rolling the certificate updates via quality/security updates; installing current updates is the simplest path to success for most machines.
  • Re-run the PowerShell checks above after updates, then reboot twice if guided; some DB operations require two boots to fully commit.
  • If Windows Update did not apply the certificate:
  • Set the Secure Boot “AvailableUpdates” registry flag and trigger the scheduled update task:
Code:
Set-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Control\SecureBoot" -Name "AvailableUpdates" -Value 0x40
Start-ScheduledTask -TaskName "\Microsoft\Windows\PI\Secure-Boot-Update"
  • Reboot the system once or twice and re-check with the PowerShell verification command.
  • Check OEM firmware updates.
  • If the DB update fails because the firmware doesn’t support DB writes or has quirks (for example, NVRAM fragmentation), your OEM may offer a BIOS/UEFI update that bakes the new cert into firmware. Check your manufacturer’s support pages for specific platform guidance and minimum firmware versions.
  • If NVRAM is full or keys are corrupted:
  • Some older systems shipped with limited NVRAM and may need a factory reset of Secure Boot keys to free variable space. This is done inside the BIOS/UEFI settings as “Reset to factory keys” or similar.
  • Important: If you use BitLocker, suspend or decrypt and keep your recovery key before resetting Secure Boot keys; losing that key can lock you out of your drive.
  • Manual enterprise deployment:
  • IT admins can use registry keys, Group Policy, Windows Configuration System (WinCS), Microsoft Intune, or other management tools to push certificates and monitor deployment progress.

The OEM angle: firmware, lists, and real-world gotchas​

OEMs are critical because the Secure Boot variables live in firmware NVRAM and hardware can behave differently. Major OEMs (Dell, HP, Lenovo, Asus, Microsoft Surface) have published lists or guidance showing which models and firmware revisions include the new certificates or require updates.
  • Newer machines (many models shipped in 2024–2025) often include the 2023 certs in firmware already; these are the least likely to need action.
  • Older models may require a BIOS update or a manual process to free NVRAM space or accept the new certs.
  • Some OEM firmwares expose settings that control whether third-party UEFI CA keys are enabled — for example, an option to enable or disable third-party UEFI CA keys (useful for organizations that don’t want option ROM trust).
Common firmware-related failure modes:
  • NVRAM full or fragmented: the DB update cannot be written; factory reset of Secure Boot keys can free space.
  • Vendor firmware bugs: some BIOS implementations may not correctly honor DB or KEK updates; OEM-specific fixes are highly possible.
  • TPM/firmware mismatches: machines with older TPM versions or unusual firmware stacks can exhibit unexpected failures during the update.

Enterprise deployment: planning, monitoring, and rollouts​

For IT administrators managing fleets, treat this as a short, high-risk project with clear phases:
  • Inventory: enumerate devices with Secure Boot enabled, firmware versions, and current DB and dbdefault states. Use built-in PowerShell scripts, management tools, or Intune custom compliance checks.
  • Targeting: Microsoft’s deployment is phased; prioritize devices that are in service and can be updated automatically, but make sure to identify unmanaged or out-of-band machines that need special attention.
  • Staged rollout: test certificate installation and firmware updates on representative hardware before mass deployment. Verify BitLocker recovery procedures and process to reset Secure Boot keys.
  • Monitoring: watch Event Viewer logs for Secure Boot update events, and monitor scheduled task runs and registry settings. Microsoft provides event IDs and guidance for successful/failed updates.
  • Remediation: prepare scripts to set the registry flag and start the Secure-Boot-Update scheduled task remotely. For devices that fail due to firmware, prepare end-user guidance or OEM support channels.
  • Fallback and recovery: maintain awareness of BitLocker and keep recovery keys accessible; document the steps to restore functionality after a Secure Boot key reset.
Many management suites (Intune, SCCM, etc.) now expose built-in methods for deploying and monitoring this update specifically; use those to provide centralized status reporting.

Special scenarios and technical edge cases​

  • Virtualized environments: Hyper‑V and other hypervisors can produce event-driven failures when the OS attempts a DB update. Some VMs block writing the variables or exhibit error Event IDs that require vendor guidance. Test updates in lab virtual machines before broad rollouts.
  • Dual‑boot systems and Linux: distributions that rely on the Microsoft-signed shim will need updated shims signed by the new CA. Some Linux vendors are publishing new shim packages or guidance to ensure boot compatibility.
  • Third-party boot code and option ROMs: as Microsoft has split the original UEFI CA into two distinct 2023 certificates (one for bootloader signing and one for option ROMs), organizations that depend on third-party option ROMs (for example, networking or GPU option ROMs) must pay attention to whether those CA entries are enabled in firmware.
  • Offline machines: devices not connected to Windows Update may need manual remediation via OEM firmware packages or IT deployment mechanisms.
  • End-of-life hardware: platforms released years ago and no longer supported by the OEM may never receive a firmware update; for those devices, consider hardware replacement or a carefully managed security exception and migration plan.

Troubleshooting tips — what to check if the update fails​

  • Reboot at least twice after attempting a DB update; some devices require two boots to complete the secure-boot DB commit.
  • Verify the scheduled task exists: look for the “\Microsoft\Windows\PI\Secure-Boot-Update” scheduled task; if missing, the host may not have the required servicing logic.
  • Confirm the system has recent cumulative updates that include the DB update logic (devices must have updates from a 2024 servicing baseline or the specific security updates that add the update mechanism).
  • Check registry flags under HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecureBoot\Servicing for expected keys (for example, flags controlling whether the DB update is allowed).
  • If you get firmware-level write failures or cryptic errors, consult the OEM’s support documentation and firmware advisories; often OEMs have hotfix BIOSes that include the baked-in 2023 certs or fix leaks in NVRAM handling.
  • For enterprise admins: use Microsoft’s deployment diagnostic scripts and event log monitoring guidance — these supply the most reliable indicators of whether the DB/KEK change has applied successfully.

Strengths of the update and Microsoft’s rollout approach​

  • Forward-looking security: renewing the CAs is essential to maintain the ability to update and mitigate future boot-level vulnerabilities; without this rotation, future mitigations signed by Microsoft could not be trusted.
  • Phased and measured deployment: Microsoft is using Windows Update with rollout controls and criteria to avoid mass breakage, and it’s providing multiple deployment paths (Windows Update, registry flags, Group Policy, WinCS, Intune).
  • OEM coordination: major OEMs are coordinating firmware updates and guidance to ensure the widest possible coverage and to bake the certificates into firmware where appropriate.
  • Granularity: separating option ROM signing from bootloader signing in the new 2023 certificates gives OEMs and administrators finer control over what kinds of third-party code get trusted by default.

Risks, limits, and things Microsoft can’t fix for you​

  • Device support lifecycles: if an OEM no longer supports a platform, a BIOS update with the new certs may never be issued; in those situations, Microsoft’s in-band DB update may also fail due to firmware limitations.
  • NVRAM limitations and firmware bugs: Microsoft cannot retroactively fix buggy vendor firmware; that requires OEM engagement and, in some cases, hardware replacement.
  • Non-updated, unsupported OS installs: Windows 10 machines not on ESU and other unsupported OS installs will not receive these updates, leaving those systems permanently unable to get Microsoft’s signed pre-boot protections.
  • User risk during remediation: actions like resetting Secure Boot keys can trigger BitLocker recovery prompts — if recovery keys aren’t available, data access may be interrupted for users.
  • Edge-case compatibility: specialized hardware that requires trust for custom boot-time components may need additional signing workflows or manual key enrollment, which is non-trivial for some organizations.

Practical checklist (two-minute action list)​

  • Open msinfo32 and confirm Secure Boot state is On.
  • Run the PowerShell DB and dbdefault checks listed earlier.
  • If either returns False, install all pending Windows Updates and reboot twice.
  • If still False, set the AvailableUpdates registry flag and trigger the Secure-Boot-Update scheduled task.
  • If that fails, check for an OEM BIOS/UEFI update and contact the manufacturer if needed.
  • For enterprise fleets, inventory Secure Boot state and certificate status and plan a staged remediation using your management tools.

Conclusion​

This certificate rollover is not a mysterious new vulnerability — it’s routine cryptographic maintenance at the foundation of how Windows establishes trust during boot. But the practical stakes are real: miss the replacement and your PC will still boot today, but it will be increasingly unable to receive future boot-level defenses and may start to encounter compatibility issues with newly signed boot components.
For most users the path is simple: keep your system updated, confirm Secure Boot is enabled, and run the quick PowerShell checks. For IT administrators and shops with older or customized hardware, treat this as a short but urgent project: inventory, test, and remediate before the June and October 2026 deadlines to avoid a future of degraded boot security and avoidable support headaches. A handful of minutes checking your certificate status now could prevent a much larger, more disruptive problem months from now.

Source: Technology Org Windows Secure Boot Certificates Expire June 2026 - Technology Org
 

Microsoft and the PC ecosystem are executing a quiet—but urgent—“generational refresh” of the cryptographic anchors that protect the very first code your PC runs, replacing Secure Boot certificates issued in 2011 with a new 2023 certificate family so billions of Windows PCs can keep receiving boot‑level updates and remain resilient against modern bootkits and pre‑OS attacks.

Secure Boot links 2011 to 2023 in a BIOS/UEFI chain, securing OS enrollment.Background​

Secure Boot has been a foundational security control for Windows platforms since Windows 8, enforcing a cryptographic chain of trust in UEFI firmware that ensures only signed, trusted code runs before the operating system loads. That trust is built on a small set of certificate authorities (CAs) stored in firmware variables (PK, KEK, DB, DBX). The certificates Microsoft and OEMs provisioned around 2011 were never intended to last forever: they include explicit expiry windows. Those 2011 CAs begin to lapse in mid‑2026, with a final expiration window stretching into October 2026. Left unaddressed, the expirations would not instantly brick systems, but they would throw affected devices into what Microsoft describes as a “degraded security state”: the firmware would continue to boot existing signed components, but the platform would lose the ability to accept new signed pre‑boot components or future security fixes to pre‑boot code.
Microsoft, working with OEMs and the broader UEFI ecosystem, prepared a replacement certificate family issued in 2023 and is rolling those certificates into devices using a two‑pronged approach: (a) OS‑side enrollment via staged Windows servicing updates that write certificate variables into firmware where permitted, and (b) firmware (BIOS/UEFI) updates from PC manufacturers for platforms that require vendor provisioning. This coordinated effort is designed to preserve Secure Boot continuity and ensure devices remain serviceable and secure for the next decade.

What exactly is expiring — the technical picture​

At a technical level, three Microsoft‑issued certificates long present in UEFI are the focal point of this refresh. They are being replaced by a set of four (split to provide finer trust separation):
  • Microsoft Corporation KEK CA 2011 → Microsoft Corporation KEK 2K CA 2023 (stored in KEK; used to sign updates to the DB and DBX).
  • Microsoft Corporation UEFI CA 2011 → Microsoft UEFI CA 2023 and Microsoft Option ROM UEFI CA 2023 (stored in DB; separates bootloader signing from option ROM signing).
  • Microsoft Windows Production PCA 2011 → Windows UEFI CA 2023 (stored in DB; used to sign the Windows boot manager and related boot components).
Key dates to bear in mind (concrete expiration windows): the KEK and most UEFI CA entries begin expiring around June 2026; the Windows boot signing PCA expires later in 2026, with an October window for that PCA. The exact device‑level risk depends on whether a system already contains the 2023 certs in firmware (many systems shipped in 2024–2025 do), whether Windows Update can write the variables, or whether the OEM must provision them.

Why this matters: practical consequences of expired keys​

Secure Boot’s certificates do not simply sit idle — they are the mechanism by which new pre‑boot fixes and revocations are trusted. When those certificates expire:
  • Devices will continue to boot normally in the short term, but they will be unable to accept newly signed pre‑boot components or security fixes that rely on the Microsoft CAs.
  • The platform will lose the ability to receive DBX (revocation) updates for pre‑boot components signed under the expiring CAs, preventing Microsoft from blocking or revoking compromised bootloaders or option ROMs going forward.
  • Over time, that limits the vendor’s capacity to respond to boot‑level vulnerabilities, leaving devices susceptible to sophisticated persistent threats that operate beneath the OS (bootkits, UEFI rootkits).
  • Compatibility problems can appear: new OS builds, drivers, virtualization or anti‑cheat components that expect modern Secure Boot roots may fail to load or refuse to operate on devices with stale trust anchors.
  • For Windows 10 systems that are no longer under mainstream updates, only devices enrolled in Extended Security Updates (ESU) will receive the certificate updates through Microsoft’s servicing channels; unsupported machines otherwise risk indefinite degradation.
Put plainly: expired root CAs won’t instantly break your PC, but they close the door on future protection and remediation for the earliest—and most dangerous—attack surface on a PC.

How Microsoft and OEMs are rolling this out​

This is a coordinated, multi‑stage engineering and logistics project involving Microsoft, major OEMs, firmware vendors, and downstream software vendors.
  • Most modern PCs shipped since 2024 and almost all PCs shipped in 2025 were provisioned with the new 2023 certificates at manufacture. These systems require no action.
  • For in‑market devices, Microsoft is delivering OS‑side enrollment logic as part of Windows monthly quality updates; targeted, telemetry‑gated rollouts ensure updates only apply on devices that report they can accept the change safely.
  • For a fraction of devices, the OS‑side enrollment cannot proceed until the OEM provides a firmware (BIOS/UEFI) update that allows or includes the 2023 certificates. OEMs are publishing model‑level lists and firmware branches for affected platforms.
  • Microsoft plans to expose a certificate update status indicator in Windows Security in the coming months so users and administrators can more easily verify their device’s state.
  • Administrative tooling and guidance are available for enterprise environments: PowerShell checks, event IDs to monitor, registry flags and Group Policy controls to approve, block, or monitor rollout behavior.
One practical verification command administrators and advanced users can run in an elevated PowerShell session to check whether the Windows UEFI CA 2023 is present in the enrolled DB is:
([System.Text.Encoding]::ASCII.GetString((Get-SecureBootUEFI db).bytes) -match 'Windows UEFI CA 2023')
A result of True indicates the Windows UEFI CA 2023 is present; False indicates the system still needs the platform or firmware update.

Who’s affected — consumer and enterprise impact matrix​

  • Home users on modern PCs with Windows Update enabled: most will see this happen automatically and invisibly. If Windows Update and firmware are current, no action is likely needed.
  • Home users on older or unsupported hardware: if the OEM does not provide a firmware update, their devices may remain dependent on 2011 certificates and will eventually enter the degraded security state unless upgraded or replaced.
  • Windows 10 devices: support for Windows 10 ended in October 2025 for general availability. Only Windows 10 systems enrolled in the ESU program (Extended Security Updates) will receive the candidate certificate updates through Microsoft servicing. Non‑ESU Windows 10 machines face a higher long‑term risk.
  • Enterprises: the risk is operational and logistical rather than sudden. Large fleets will need inventory, testing, and staged rollouts. Telemetry gating may require diagnostic data settings for Microsoft‑managed enrollment paths; some environments that block telemetry may need to adopt alternative deployment strategies.
  • Linux and multi‑boot systems: distributions that rely on signed shim/boot loaders must update shims signed with the new 2023 CA; many major distributions have already planned for refreshed shims. Systems that manage their own signing workflows (custom kernels, signed drivers) should audit their signing processes.
  • Secured‑core devices and those with strict policy: some configurations that intentionally limit third‑party UEFI CA enrollment may require additional consideration. The 2023 rollout split option ROM signing into a separate CA to give administrators more control.

Critical technical and operational risks​

The refresh is necessary, but it is not without real risks and operational complexity.
  • Firmware update dependency: a subset of devices cannot accept OS‑side enrollment and require OEM firmware updates. OEM support lifecycles vary and older models may never be updated.
  • Telemetry gating and staged rollouts: Microsoft’s controlled rollout uses update signals to minimize risk. That’s sensible engineering, but it can leave air‑gapped, telemetry‑restricted, or privacy‑conscious fleets waiting unless IT teams adopt alternate provisioning methods.
  • Dual‑boot and custom‑signed environments: organizations or power users with custom signing workflows, self‑signed boot components, or unusual PK/KEK configurations face a higher chance of needing manual intervention and careful testing.
  • Recovery complexity: incorrectly applied Secure Boot DB/KEK changes or firmware resets can cause Secure Boot violations—rare but technically challenging to recover from without proper recovery media and documentation.
  • Supply chain and OEM support variability: the success of the refresh depends on thousands of firmware SKUs and vendor processes. Inconsistencies in firmware implementations (and legacy firmware bugs) are the chief operational hazard.
  • Windows 10 fragmentation: Windows 10 machines outside ESU are at elevated risk, and enterprises that maintained Windows 10 for specialized workloads will need explicit ESU enrollment, or migration, to preserve the update path.

Strengths of Microsoft’s approach​

  • Proactive coordination: issuing the new 2023 certificate family well in advance and coordinating with OEMs reduces the likelihood of an abrupt serviceability crisis.
  • Staged, telemetry‑gated rollouts: reduces the chance of mass regressions and gives Microsoft the ability to hold or adjust the deployment if telemetry indicates incompatibilities.
  • Granular trust model: splitting roles (bootloader vs option ROM signing) gives administrators finer control over what third‑party components to trust—an improvement for security posture.
  • Multi‑vector delivery: offering both OS‑side enrollment and OEM firmware updates maximizes coverage across device generations and configurations.
  • Tooling and guidance for IT: Microsoft is exposing checks, playbooks, and deployment recommendations to give organizations the control they need.

Concrete steps for administrators and power users​

  • Inventory and classification
  • Identify which devices have Secure Boot enabled and which firmware versions are installed.
  • Flag devices that are air‑gapped, telemetry‑restricted, or otherwise unable to accept Microsoft‑managed updates.
  • Verify certificate state
  • Run the recommended PowerShell check on representative devices to confirm presence of the Windows UEFI CA 2023 and KEK 2K CA 2023.
  • Watch for the certificate status indicator in Windows Security when it becomes available.
  • Patch and firmware program
  • Ensure Windows Update is applied: the January servicing wave and ongoing cumulative updates carry the OS‑side enrollment logic.
  • Coordinate with OEMs to apply firmware updates where required. Consult vendor advisories for model lists and minimum BIOS versions.
  • Testing and staging
  • Build a lab that mirrors production configurations (including dual‑boot and custom‑signing scenarios).
  • Validate Secure Boot recovery procedures, including recovery media, key backups, and documented steps for PK/KEK/DB/DBX restoration.
  • Policy and telemetry
  • For Microsoft‑managed enrollment, ensure required diagnostic data settings are reconciled with corporate privacy policies or implement an alternate provisioning plan.
  • Establish monitoring to detect enrollment failures and post‑rollout regressions.
  • Windows 10 ESU path
  • For critical Windows 10 endpoints, enroll in ESU where necessary or plan migration to supported Windows versions. Validate that ESU enrollment will receive the certificate updates.
  • Vendor coordination
  • Communicate with OEMs for timelines and expectations. For unsupported devices, assess replacement or isolation strategies.

Guidance for home users​

  • Keep Windows Update enabled and apply firmware updates offered by your PC manufacturer.
  • Check your system with the PowerShell command shown earlier if you are comfortable with PowerShell, or wait for the Windows Security status indicator to appear.
  • If your PC is older and the OEM does not offer firmware updates, plan hardware refresh or consider isolating that device from sensitive networks.
  • Avoid disabling Secure Boot unless you understand the implications: turning it off removes the firmware‑level protections that make these certificate updates meaningful.

Linux, shims, and third‑party ecosystems​

Linux distributions that participate in the Secure Boot ecosystem generally rely on a signed shim bootstrap that is accepted by firmware. When Microsoft changes the CA used to sign Windows and third‑party boot components, Linux maintainers must ensure their shim binaries are re‑signed under the new CA or otherwise adopt the new trust anchors. Major distributions and enterprise Linux vendors are already coordinating shim updates and refreshed shims signed to the 2023 CA where applicable. If you manage Linux fleets or dual‑boot machines, coordinate updates with your distribution vendor and test boot paths before mass deployment.

Longer‑term implications and recommendations​

This generational refresh is a useful reminder that certificate lifecycles are an operational reality for foundational security primitives. Organizations should:
  • Treat firmware and boot security as first‑class patching items in change management programs.
  • Build and maintain a firmware‑update program with OEM SLAs and visibility into model‑level readiness.
  • Design for recoverability: Secure Boot recovery media and documented PK/KEK/DB/DBX management procedures should be part of standard runbooks.
  • Consider platform‑level security posture (e.g., Secured Core PCs) for future procurement to reduce friction for certificate rotations and tighter control over option ROM trust.

Final assessment: necessary, well‑executed — but not risk‑free​

Microsoft’s certificate refresh is technically necessary and overall well‑designed: issuing new CAs in 2023, coordinating with OEMs, splitting signing roles for more granular trust, and using a staged, signal‑driven rollout are all sensible controls that reduce the risk of a brittle mass cutover. At the same time, the update highlights persistent gaps in firmware ecosystems: vendor support windows, inconsistent firmware behavior, and the operational burden on enterprises to inventory and remediate large, heterogeneous fleets.
For IT teams, the message is clear and urgent: validate, test, and update now—before certificate expirations begin in mid‑2026. For home users, keep Windows Update and firmware current; most modern systems will be updated automatically. And for organizations still running unsupported OS versions, such as Windows 10 outside ESU, this is another hardline signal that continuing to run end‑of‑life platforms increases long‑term security and compatibility risk.
This refresh preserves the ability to fix the earliest stages of the platform stack for years to come. But its success will ultimately come down to coordination: Microsoft’s update plumbing is ready, OEMs must keep firmware lanes open, and IT teams must do the inventory and testing required to ensure a smooth handover of the system’s root of trust. The clock is ticking—take the steps above now to avoid a future where your devices can boot, but no longer securely receive the protections they need.

Source: Digit Securing the boot: Why Microsoft is updating 15 year old security keys
 

Microsoft has quietly begun a coordinated refresh of the Secure Boot certificate chain that underpins modern Windows platform security, rolling new 2023-era certificate authorities into firmware and Windows updates so devices running Windows 10 and Windows 11 can continue to trust and receive pre-OS fixes well after Microsoft’s decade-old 2011 certificates begin to lapse in mid‑2026.

Blue-toned illustration of Secure Boot and UEFI security on a circuit board.Background​

Secure Boot is the firmware-level trust gate that validates every piece of code that runs before the operating system. It works by keeping a minimal set of cryptographic trust anchors in UEFI firmware — the Platform Key (PK), Key Exchange Keys (KEK), the allowed signatures database (DB), and the revoked signatures database (DBX) — and using those anchors to decide whether a bootloader, option ROM, shim, or other EFI application is permitted to execute. When those anchors expire or no longer match the signature chains used by newly signed components, the firmware can still boot, but it can no longer accept or validate updated pre‑OS components under the new signing chains. That limitation is the operational risk Microsoft and the OEM ecosystem are now addressing.
The specific problem stems from widely deployed Microsoft-issued certificate authorities created around 2011 that are scheduled to approach or begin expiring in 2026 (with related production PCA expirations extending into October 2026). Left unaddressed, the expiry of those trust anchors would prevent future Secure Boot updates — including new boot managers, updated shim binaries, and in‑firmware revocations — effectively freezing the platform’s ability to receive boots‑level mitigations and potentially breaking compatibility with software that relies on modern signing. Microsoft, together with OEM partners, prepared replacement CAs — the Windows UEFI CA 2023, Microsoft UEFI CA 2023, Microsoft Option ROM UEFI CA 2023, and Microsoft Corporation KEK 2K CA 2023 among them — and has started delivering those certificates to eligible devices through a phased OS- and firmware-driven program.

What Microsoft is doing now​

Microsoft's approach is multi-layered and deliberately cautious: it combines OS-side delivery of CA certificates with coordinated OEM firmware updates and a telemetry-gated staging system to reduce the chance of mass disruption. Key elements include:
  • Delivering the 2023 CA family in Windows quality updates and servicing packages so capable devices can have the new certificates written into their UEFI variables by the operating system.
  • Replacing the shipped Windows boot manager with a binary signed under the new 2023 CA — but only after the device demonstrates readiness and the new CA is present in firmware. This swap is order-sensitive and requires a restart to complete.
  • Coordinating with OEMs to ship firmware updates (BIOS/UEFI) that accept OS-driven writes to KEK/DB where necessary, and publishing per-model guidance and minimum firmware revisions so administrators can plan sequencing.
  • Using telemetry and health checks as gating signals so Microsoft only enrolls devices that show successful update behavior, reducing the risk of pushing changes to systems with non‑standard firmware behavior.
This is not a single, universal push. Microsoft has embedded targeting metadata and servicing logic in the January and February 2026 cumulative updates to control when and which devices receive the certificates and the associated boot manager replacement. The packages are engineered to follow a strict ordering — add DB entries (new CA certificates), add OEM-signed KEK material where needed, then replace the boot manager — to avoid scenarios where a bootloader is replaced by a binary whose signer the firmware does not yet trust.

Technical mechanics — how the rollout works​

To understand the mechanics, it helps to walk the update flow step by step:
  • Windows Update (or enterprise distribution) delivers a quality update that contains a payload with the 2023 CAs and device-targeting metadata.
  • A scheduled servicing task on the endpoint polls readiness flags and registry markers (for example, an AvailableUpdates / UEFICA2023 bitmask) and evaluates telemetry and firmware behavior. Only devices passing these checks progress.
  • The update writes the new Microsoft Windows UEFI CA 2023 into the DB. Conditional additions follow for Microsoft UEFI CA 2023 and Microsoft Option ROM UEFI CA 2023 if the device also contains the older 2011 entries.
  • The Microsoft Corporation KEK 2K CA 2023 is added to KEK. For many systems this step requires OEM-signed KEK material in firmware; where the firmware doesn't permit OS-driven KEK writes, an OEM firmware update is required.
  • Once the firmware trusts the new CA, Windows replaces the in-box boot manager with a variant signed by the 2023 CA; a restart is necessary to complete this trust hand‑off.
This sequence avoids a dangerous intermediary state — for example, putting a boot manager signed by the 2023 CA on a device that still relies solely on the 2011 CA would render that new binary untrusted by firmware and could prevent boot-level updates. Microsoft’s ordering and readiness gating are designed precisely to prevent that outcome.

What shipped in January–February 2026 (practical details)​

Microsoft carried the enrollment logic and expanded targeting metadata through its January 13, 2026 cumulative updates and continued the phased work in February updates. Notable packages and the roles they play:
  • January 13, 2026 cumulatives (initial delivery of device-targeting metadata and servicing logic for enrollment).
  • February 10, 2026 cumulatives for Windows 11 included updates that alter the rollout conditions and replace the boot manager on devices that already have Windows UEFI CA 2023 in firmware (list includes KB5077179, KB5077181, KB5075941 across various Windows 11 channels). These packages primarily adjust the staging and execute the final hand-off on eligible systems.
Administrators should treat these updates as functional changes to the servicing pipeline — not simple bug fixes — because they change the system’s ability to accept future Secure Boot updates. The updates also contain other fixes (driver or security patches), but the operational significance is the secure root refresh in the firmware trust chain.

Who is affected and which systems are at risk​

The good news: the majority of modern systems shipped since 2024 — and an increasing share of 2025 devices — already include the 2023 certificates in firmware, meaning many contemporary PCs will require no action. However, a meaningful subset of in-market devices and specialized environments require attention:
  • Older systems still reliant on the 2011 Microsoft CAs that have not received recent firmware updates. These devices are the primary risk group unless Microsoft’s OS-driven enrollment succeeds.
  • Enterprise fleets with strict telemetry-off policies, network-segmented machines, air-gapped devices, or machines controlled by management tools that block OS-driven firmware writes. These devices may not be eligible for automatic enrollment and will need manual remediation via firmware updates or administrator-driven certificate writes.
  • Virtual machines and cloud images that depend on platform firmware-based Secure Boot. Some virtual firmware implementations or cloud images may need updates or image re-provisioning to include the 2023 CA entries.
  • Multi-boot systems (Linux or other OSes) that use shim or vendor-signed bootloaders: Linux distributions and upstream projects have warned that the 2011 key expiry affects how shim and signed bootloaders are trusted, so the transition has cross-OS implications where users chainboot between Windows and non-Windows systems.
If a device misses the transition before the 2011 CAs lapse, it will likely continue to boot but lose the ability to validate and receive Secure Boot-level updates — an increasingly serious operational and security issue over time.

Actionable guidance for administrators and enthusiasts​

This transition is manageable with planning. The recommended steps for IT teams and informed users are:
  • Inventory firmware versions and Secure Boot key databases across your fleet. Prioritize devices that show older firmware or a history of update failures.
  • Deploy OEM firmware updates where required. OEMs have published per-model guidance and lists of minimum BIOS revisions needed to accept the 2023 CA material. Sequence firmware updates before or in concert with the Microsoft-servicing changes on devices that require OEM cooperation.
  • Allow the necessary servicing and telemetry channels for staged OS-driven enrollment on devices that can accept it. For managed environments that block telemetry, plan alternate remediation steps.
  • Review recovery media and image provisioning workflows. Rebuild or refresh recovery images to include updated boot manager binaries and the 2023 CA where appropriate so recovery scenarios don’t surprise you with older signing chains.
  • Test on representative systems first. Use a small pilot to ensure firmware and management tooling behave as expected during DB/KEK writes and boot manager replacement. Only then expand the rollout.
For organizations that cannot accept OS-driven firmware writes (for compliance, security, or operational reasons), manual remediation instructions are available from Microsoft and OEMs; these typically involve applying OEM firmware updates and following documented steps to enroll KEK/DB entries. Administrators must treat this as a planned maintenance item, not a low-priority patch.

Risks, edge-cases, and where things can go wrong​

The transition is necessary, but it is not risk-free. Microsoft’s telemetry gating and staged approach are specifically designed to limit two major failure modes: widespread boot regressions from firmware that behaves unexpectedly, and mass distribution of an OS-signed boot manager that firmware does not yet trust. Still, several risk vectors remain:
  • Firmware idiosyncrasies: Many older OEM firmware implementations vary in whether they allow OS-driven KEK or DB writes. When firmware refuses the required writes, the OS-initiated flow cannot complete without an OEM firmware update. That creates a coordination problem at scale.
  • Air‑gapped or telemetry-disabled systems: Devices that never send the update telemetry Microsoft uses for gating may be omitted from automatic enrollment and must be handled manually. Large organizations should not rely on automatic enrollment alone for such systems.
  • Virtualization and cloud images: Some hypervisors or cloud vendors expose firmware interfaces that behave differently from physical OEM firmware. If the underlying virtual firmware does not receive updates or images are not rebuilt with the new CA, VMs could be left unable to accept future Secure Boot updates.
  • Anti‑cheat and DRM: Several anti-cheat systems and DRM components depend on Secure Boot or signed pre-OS components. A botched or delayed transition could cause compatibility problems for gaming platforms that require updated signing chains. Microsoft and vendors are aware, but the potential for user‑facing breakages exists in corner cases.
Administrators must be wary of over-reliance on automation. The staged auto-enrollment is a powerful tool, but it is not an absolute guarantee for every device. Where possible, pair Microsoft’s OS-side updates with vendor firmware updates and local testing to ensure end-to-end compatibility.

The policy and transparency angle​

Microsoft’s messaging makes clear that this is a cooperative industry effort — firmware vendors, OEMs, operating system vendors, and downstream software authors (including Linux distributors and anti-cheat vendors) must adapt in concert to avoid service gaps. Microsoft has published guidance and health-gating mechanics in cumulative KB notes and administrative support documentation to give IT professionals the information needed to plan. The company’s decision to gate enrollments by telemetry and update signals reflects a desire to prioritize safety over speed: the update will enroll only devices that have shown a history of successful servicing to reduce the chance of a mass regression.
That said, the reliance on telemetry also raises policy questions for privacy-conscious administrators and organizations that intentionally limit diagnostic telemetry. Those environments face extra operational burdens and must either accept manual remediation work or adjust telemetry policies temporarily to permit enrollment. Microsoft and OEM guidance include explicit instructions for manual remediation scenarios to help those customers, but the burden of action ultimately lies with administrators.

Timeline — what to watch for (specific dates and milestones)​

  • January 13, 2026: Microsoft shipped cumulative updates that introduced the certificate delivery logic and device-targeting metadata for OS-driven enrollment. Administrators should already have reviewed these packages for their fleets.
  • February 10, 2026: Microsoft shipped further cumulative updates for Windows 11 that adjusted rollout conditions and performed boot manager replacements on devices already containing the Windows UEFI CA 2023. These packages expanded targeting metadata and continued the phased rollout.
  • June 2026 (calendar window): The 2011 Microsoft-issued CAs begin to expire. Devices that have not transitioned to the 2023 certificates before the lapse will no longer be eligible for Secure Boot-level updates. Administrators must ensure their fleets are transitioned before this timeframe.
  • October 2026 (related): A related Microsoft Windows Production PCA expiration falls in October 2026, which compounds the need for a timely transition for some certificate chains.
Administrators should treat June 2026 as the critical operational deadline for ensuring devices can accept new Secure Boot updates; anything left on the old 2011 trust anchors after that point will be unable to receive the next generation of pre‑OS fixes.

Critical analysis — strengths, gaps, and recommendations​

Microsoft and the OEM ecosystem are tackling a genuinely difficult problem: replacing firmware trust anchors on millions of devices with diverse firmware behavior and management postures. The program’s strengths are clear:
  • Proactive planning and engineering. Issuing new CAs in 2023 and preparing OS-side enrollment logic shows Microsoft anticipated the expiry problem and built tools to address it rather than forcing a disruptive, last-minute scramble.
  • Order-sensitive workflow and telemetry gating. The DB → KEK → boot manager replacement ordering and the use of health/telemetry signals reduce the risk of mass failures. This defensive design reflects hard lessons learned from previous large-scale update rollouts.
  • OEM collaboration. Manufacturers shipping updated firmware in new devices and providing per-model guidance reduces the long-term operational burden for future hardware.
However, there are notable gaps and potential failure modes:
  • Reliance on telemetry creates visibility blind spots. Organizations that disable telemetry for valid privacy or compliance reasons may find themselves excluded from automatic enrollment. Manual remediation is possible but expensive at scale. Microsoft’s guidance addresses this, but it remains an operational headache.
  • Firmware heterogeneity. The enormous variance in UEFI implementations across vendors and models means there will be corner-case devices that require bespoke handling or firmware updates that are never released. Those orphaned devices become long-term security liabilities.
  • Complexity for mixed-OS and virtualized environments. The transition’s cross-OS implications (Linux shim, multi-boot) and the uncertain behavior of virtual firmware environments add extra coordination work for multi-platform shops.
Recommendations for IT leaders:
  • Treat this program as a standing item on your maintenance calendar — assign owners, create a test plan, and prioritize firmware updates for at-risk models.
  • Use pilot groups to validate OEM firmware behavior and ensure recovery images are updated before broad rollout.
  • Budget resource time to remediate air-gapped, telemetry-off, or legacy devices that cannot be updated automatically. Manual KEK/DB enrollment or device replacement may be necessary.

Final takeaways​

This Secure Boot certificate refresh is one of those behind-the-scenes infrastructure efforts that, if done well, will be invisible to most users but is essential to platform security over the next decade. Microsoft’s staged, telemetry-gated rollout paired with OEM firmware cooperation is the pragmatic approach to a complex systems problem: upgrade the root of trust without creating a boot-time emergency.
Nevertheless, operational responsibility ultimately rests with IT organizations and device owners. Inventory your devices, prioritize firmware updates, test widely, and treat June 2026 as the effective deadline for ensuring Secure Boot trust is refreshed. Systems that miss this migration will still boot but will progressively lose the ability to receive critical pre‑OS mitigations — a degraded security posture that is avoidable with planning.
Prepare now, test thoroughly, and coordinate with your OEMs; the next generation of Secure Boot trust anchors are rolling out, and the cost of inaction will be felt next year if the transition is left unchecked.

Source: Mezha Microsoft updates Secure Boot certificates to protect Windows 10 and Windows 11 before they launch
 

Back
Top