• Thread Author
Microsoft and the PC industry have quietly opened a narrow but critical window to prevent a pre‑OS security gap this year: Windows will start rolling replacement Secure Boot certificates into device firmware via staged OS updates, while Microsoft is simultaneously intensifying its public push for Windows 10 users to migrate to supported platforms or Extended Security Updates (ESU). The two stories are tightly connected—one is a technical, low‑level fix to preserve the chain of trust that guarantees platform integrity at boot, and the other is a broader security and lifecycle message about the risks of running an unsupported operating system. Taken together, they matter for every Windows user: from consumers to global enterprise fleets—because a failure to act now can convert a subtle certificate expiry into an operational headache or a real security incident later in 2026.

A neon schematic of secure boot certificate renewal for firmware and OS enrollment.Background: why Secure Boot certificates and Windows lifecycle now matter​

Secure Boot is the UEFI‑level gatekeeper that ensures only cryptographically signed boot code runs before the OS takes over. The trust anchors for that gatekeeper are certificate authorities (CAs) stored in firmware variables (PK, KEK, DB and DBX). Those CA certificates age, and when they expire they can no longer be used to sign or verify the signatures that Secure Boot relies on. Microsoft and OEM partners issued the original family of Microsoft‑supplied Secure Boot certificates around 2011; those certificates are scheduled to begin expiring in mid‑2026, with a final Windows boot‑signing PCA set to reach end of validity later in 2026. That creates a time‑sensitive operational problem: if the firmware on affected devices still only trusts the 2011 certificates, the platform may enter a degraded state where it can no longer accept newly signed pre‑OS components or security revocations, undermining the ability to respond to emerging boot‑level threats.
At the same time, Windows 10 reached its formal end of support era in October 2025. Microsoft’s messaging to users and IT teams since then has emphasized migration to Windows 11 or enrollment in ESU for those who must remain on Windows 10 for business reasons. The intersection of an OS that is out of mainstream support and a certificate renewal that requires OS‑side servicing introduces practical limits: some Secure Boot certificate updates are only being delivered automatically to devices that have the supporting servicing pipeline—meaning most Windows 11 devices will receive them seamlessly, while many Windows 10 devices must either be in ESU or be managed differently. This is why the two announcements—certificate updates and "upgrade now" warnings—are not separate PR items but interrelated risk mitigation steps.

What Microsoft announced and how it’s being delivered​

Key points of Microsoft’s public plan​

  • Microsoft has issued a new family of Secure Boot CAs (the "2023" certificates) to replace the aging 2011 Microsoft CAs. The replacement pairings include a new KEK CA and updated DB‑level CAs for the Windows bootloader and option ROMs. These new certificates are the anchors Windows needs to continue signing and revoking pre‑OS components in a modern cryptographic context.
  • Microsoft is delivering the enrollment logic for these new CAs through staged Windows servicing updates, not an immediate mass firmware rewrite. Specifically, recent cumulative updates include targeted device‑eligibility metadata and enrollment logic that can add the 2023 certificates into firmware variables on capable systems. The January 2026 servicing cadence exposed the delivery mechanism: OS packages (notably part of Windows 11's KB5074109 and Windows 10 servicing for ESU devices via KB5073724) now embed the high‑confidence targeting and payloads to start safe enrollments.
  • The rollout is gated and telemetry‑aware. Microsoft’s approach only enrolls new CAs automatically on devices that demonstrate a history of successful updates and are deemed safe. Where firmware acceptance or KEK provisioning requires vendor‑signed firmware actions, Microsoft will rely on OEM firmware updates to complete the job. Administrators retain manual controls (registry keys, Group Policy, Intune options) to pilot, force, or defer enrollment.

Concrete expiry dates to watch​

  • Microsoft lists June 2026 as the start of expiry windows for two core 2011 CAs (Microsoft Corporation KEK CA 2011 and Microsoft UEFI CA 2011), with the Microsoft Windows Production PCA 2011 following later, through October 2026. These timings are not vague: Microsoft’s Secure Boot guidance and supporting KBs enumerate the replacement mappings and calendar windows. OEM documentation mirrors Microsoft’s dates in device‑level planning tables.

The technical mechanics: how the replacement actually works​

Firmware variables and the chain of trust​

UEFI Secure Boot uses several firmware stores:
  • PK (Platform Key) — typically controlled by the OEM; it authorizes the KEK.
  • KEK (Key Exchange Keys) — used to sign updates to DB/DBX.
  • DB (Allow list) — trusted signatures and certificates for boot components.
  • DBX (Deny list) — revoked signatures and known bad components.
To preserve Secure Boot continuity, Microsoft must ensure a trusted signer (a CA in KEK/DB) remains able to update DB/DBX and sign future boot components. The new 2023 certificates are designed to assume that role without requiring a wholesale firmware re‑platforming on every device.

Two delivery paths — OS‑side enrollment and OEM firmware updates​

Microsoft’s planned delivery is intentionally dual:
  • OS‑Side Enrollment: Windows quality updates now carry enrollment logic and payloads that can write the new CA entries into the firmware variables on devices that allow OS provisioning. The update will only write the new certificates after health gating and telemetry confirm the device's capacity to accept such changes safely.
  • OEM Firmware Flow: For devices where the PK/KEK configuration or UEFI implementation blocks OS‑side write actions, OEM firmware updates—which are delivered either through vendor tools or OEM channels (including Windows Update Firmware delivery where supported)—are required to add the new KEK or accept the enrollment. Some older or EOL hardware will need firmware from vendors; unsupported devices may not be able to complete the update.

Why Microsoft is gating the rollout​

The primary risk Microsoft is avoiding is firmware incompatibility and device bricking. Writing cryptographic anchors into firmware can fail on buggy UEFI implementations or where OEMs intentionally lock variables. A bad write can cause boot failures or trigger recovery states (e.g., BitLocker recovery prompts), so Microsoft’s telemetry‑gated mechanism reduces blast radius by enrolling only well‑behaved machines first. The tradeoff is schedule complexity and a small population of devices that will need manual remediation.

Who gets the automatic update — and who doesn’t​

Windows 11: broad automatic coverage​

Most Windows 11 devices that meet update health checks will receive the new 2023 certificates automatically through cumulative updates (the mechanism shipped initially with January 2026 updates). That includes the new devices shipped since 2024 that were preinstalled with the 2023 certificates already. For many consumer and managed Windows 11 PCs, the change will be seamless and require no user action.

Windows 10: ESU, restrictions, and caveats​

Windows 10 devices are a different story. Microsoft’s servicing notes and KB entries make it clear that Windows 10 recipients of the automatic certificate enrollment are limited to systems enrolled in Microsoft’s Extended Security Updates (ESU) or otherwise in supported servicing channels that receive the relevant packages. In practice, that means many Windows 10 systems—particularly unmanaged consumer devices that did not enroll in ESU—may not receive the automatic enrollment and will instead need OEM firmware updates or manual interventions. This is one reason Microsoft has been urging migrations to Windows 11 or paid ESU enrollment for devices that cannot be upgraded.

IoT, Server and Specialized hardware​

Server, industrial IoT, and some embedded platforms often use locked or vendor‑specific UEFI implementations. For those classes of devices, firmware updates from the manufacturer will be the primary path to add KEK/DB entries. Microsoft’s documentation explicitly instructs administrators for these device types to coordinate with OEMs for firmware delivery and validation. Failure to do so can leave mission‑critical devices in a state where they cannot receive future pre‑OS revocations or new signed binaries.

What can go wrong — risks, edge cases, and real operational impacts​

1. Boot failures and recovery traps​

Firmware writes fail for many reasons—locked variables, buggy UEFI implementations, or mismatched KEKs. A failed enrollment attempt can surface as a boot failure or cause the system to reject later updates that depend on the new trust anchors. In some cases this will trigger BitLocker recovery prompts requiring recovery keys, which can be operationally painful at scale. Administrators need to inventory recovery keys and prepare boot recovery plans before rolling the change broadly.

2. Devices left in a degraded security state​

If a device still trusts only the 2011 CAs after expiry, it will enter a degraded state: Windows can still run, but Microsoft cannot deliver future pre‑OS security revocation lists (DBX updates) and may be unable to sign or revoke drivers and boot components. Over time that reduces the defender’s ability to respond to new bootkits or compromised option ROMs. This is exactly why Microsoft labels the updates as necessary for continued boot‑level serviceability.

3. Windows 10 exclusion and the ESU dependency​

The interplay between Windows 10’s end of support and the certificate renewal is a practical risk: many Windows 10 devices will not be on an automatic rollout path unless they are in ESU. The consequence for organizations that delayed migration is either a set of manual firmware update projects or the risk of devices becoming increasingly insecure or brittle in the face of pre‑OS threats. Microsoft’s public warnings to upgrade are therefore not marketing rhetoric—they’re operational pressure driven by a concrete, calendar‑driven cryptographic lifecycle.

4. OEM readiness and hardware lifecycles​

Some OEMs explicitly note that older platforms (for example, many models from 2017 and earlier) will not receive firmware updates to accept the 2023 certificates, simply because the vendors no longer support those platforms. That leaves a hardware compatibility cliff: a supported OS but unsupported firmware update path. Organizations using older fleets must decide whether to replace hardware, accept the degraded state, or apply special workarounds where available.

5. Telemetry gating and privacy/operational concerns​

Microsoft’s health‑based gating relies on update telemetry to decide which machines are enrolled automatically. While this is technically sensible, it raises operational questions: what exact telemetry heuristics determine "healthy" and how will edge cases be handled? Administrators must assume some devices will be held back by the gating algorithm and plan remediation accordingly. Microsoft documentation and KBs provide administrative controls to override or pilot the enrollment, but those controls must be exercised cautiously.

Cross‑checking the claims: independent confirmations​

Microsoft’s Secure Boot guidance is the authoritative technical baseline: it lists the expiring certificates, the replacement 2023 CA names, and the explicit June/October 2026 windows. OEM advisories (for example, HP’s published readiness guidance) provide independent confirmation of the same expiry dates and concrete platform‑level constraints, including device‑specific BIOS requirements. Coverage from independent tech outlets and security reporting (The Verge, Windows Central, industry patch commentary) corroborates Microsoft’s timeline and highlights how the January servicing cycle began shipping the OS‑side enrollment logic. Those multiple touchpoints—vendor, platform owner, and independent press—give us a robust cross‑reference of the technical facts and the operational urgency. If you see a contrary claim on a vendor page, treat it cautiously and consult both OEM and Microsoft guidance before proceeding.

Practical guidance: what IT teams and home users should do now​

For enterprise IT and security teams​

  • Inventory: Build a verified inventory of devices with Secure Boot enabled and identify firmware versions, OEM models, and whether the devices accept OS‑side KEK/DB writes.
  • Recovery readiness: Ensure BitLocker recovery keys are accessible and that recovery procedures are tested for affected models.
  • Pilot: Use Microsoft’s registry/GPO/Intune controls to pilot the enrollment on a small, representative set of machines to validate vendor firmware behavior and remediation steps.
  • Coordinate with OEMs: Request firmware updates and vendor guidance for fleets where OS‑side enrollment is blocked. Prioritize vendor‑supported platforms with upcoming certificate writes.
  • Plan migrations: For Windows 10 fleets not in ESU, accelerate migration or ESU enrollment to maintain a supported servicing path for certificate updates. Document a timeline for decommissioning hardware that cannot be updated safely.
These steps prioritize safety and operational continuity while minimizing the risk of a disruptive wide‑scale rollout.

For small businesses and individual users​

  • Run Windows Update and install the latest cumulative updates; many Windows 11 users will receive the certificate enrollment automatically if their device is in a healthy update state.
  • Back up BitLocker recovery keys and make sure you can access them if a recovery prompt appears after certificate operations.
  • If you’re on Windows 10, check whether you’re eligible for an ESU program or plan to upgrade to Windows 11—Microsoft’s support lifecycle guidance and upgrade tools help determine eligibility. If your device cannot run Windows 11, talk to your OEM or consider hardware replacement plans if security is a priority.

Step‑by‑step checklist for administrators (numbered)​

  • Run a Secure Boot status sweep: use Confirm‑SecureBootUEFI and Get‑SecureBootUEFI at scale to capture current firmware variables.
  • Match firmware versions against OEM advisories for accepted BIOS versions (HP and other OEMs publish platform lists).
  • Pilot KB5074109 (Windows 11) or KB5073724 (Windows 10 ESU) on a small set of devices with known good recovery paths.
  • Record outcomes, remediation steps, and any vendor firmware updates used.
  • Scale the enrollment in waves, maintaining a rollback plan and clear runbooks for BitLocker recovery or firmware re‑flashing.

Why Microsoft’s approach is defensible — and where it could be improved​

Strengths​

  • Risk‑aware phasing. Microsoft’s telemetry‑gated enrollment reduces the chances of catastrophic firmware incompatibility, protecting large swaths of users from avoidable bricking or recovery incidents.
  • Industry cooperation. The plan positions OEMs and Microsoft to share responsibility: Microsoft provides the OS‑side mechanics, while OEM firmware updates cover locked devices.
  • Transparent timelines. Microsoft and several OEMs have published concrete expiry windows and replacement certificate mappings, allowing administrators to schedule work before calendar deadlines.

Opportunities and unresolved risks​

  • Complexity for mixed fleets. Organizations with a heterogeneous mix of OEMs, older hardware and locked firmware will face complicated, device‑by‑device processes that increase operational cost and the risk of missed devices.
  • Windows 10 fragmentation. The ESU dependency for many Windows 10 devices forces organizations into a business decision—pay for ESU, migrate devices, or accept increased risk. Microsoft’s public warnings are necessary but do not eliminate the pragmatic friction for constrained IT budgets.
  • Visibility into gating heuristics. Microsoft could improve clarity around the telemetry criteria used for "healthy" update status; more transparent guidance would help admins pre‑qualify or remediate devices ahead of the enrollment window.

A brief note on unverifiable claims and cautionary language​

Some claims you may read in social channels or vendor marketing—such as an exact measurement of what percentage of Windows 11 devices already shipped with 2023 certificates—are difficult to verify independently because that data is proprietary and distributed across OEMs. Where Microsoft or OEM pages publish explicit platform lists or expiry dates, treat those as authoritative. Where third‑party outlets offer numbers or percentages without citing vendor telemetry, flag them as estimates and favor official KBs and OEM advisories for operational planning.

Bottom line and recommended timelines​

  • Immediate (next 0–2 weeks): Ensure Windows Update is applied and backups & BitLocker recovery keys are accessible. Inventory devices and begin communications with OEM partners for firmware roadmaps.
  • Short term (1–3 months): Pilot Microsoft’s enrollment packages on representative hardware, test recovery procedures, and identify any devices requiring firmware updates. If running Windows 10 outside ESU, finalize a migration or ESU plan.
  • Medium term (3–6 months): Execute staged rollouts, coordinate firmware updates with OEMs, and retire or replace hardware that cannot be updated safely. Maintain monitoring for DBX and pre‑OS revocation decisions.
  • Ongoing: Treat firmware trust as part of routine security hygiene—periodic certificate and key rotations are a long‑term responsibility for platform security, not a one‑off event.
This isn’t merely a patch Tuesday note; it’s an operational calendar item that teams must treat like any scheduled cryptographic rollover. The decisions you make now determine whether your devices remain manageable and secure when those 2011 certificates cross the finish line in mid‑2026.

Secure Boot faithfulness is the kind of foundational security work that rarely gets headlines—until it matters. Microsoft’s coordinated certificate refresh and its public pressure to move off Windows 10 are two sides of the same coin: technical continuity and lifecycle management. For administrators, the path forward is straightforward in principle but operationally delicate in practice—inventory, pilot, coordinate with OEMs, and prioritize recovery readiness. For consumers and small businesses, the practical choices are also clear: keep systems updated, back up recovery keys, and make upgrade decisions with both costs and security timelines in mind. The clock is set by certificate expiration dates; the industry’s ability to execute a safe, low‑impact migration will determine whether this is a smooth maintenance milestone—or an avoidable crisis in 2026.

Source: Windows Blog Refreshing the root of trust: industry collaboration on Secure Boot certificate updates
Source: PCMag UK Upgrade Now: Microsoft Issues Security Warning to Those Still on Windows 10
 

Microsoft has begun a coordinated refresh of the Secure Boot certificates that underpin Windows’ pre‑boot trust model, and the change will accelerate through March as Microsoft, OEMs and IT teams push a staged, telemetry‑gated rollout to keep devices secure before the legacy certificates begin expiring in mid‑2026.

Glowing Secure Boot shield on a circuit board, flanked by Windows, PK, and DB icons.Background / Overview​

Secure Boot is the firmware‑level gatekeeper introduced with UEFI that ensures only trusted, digitally signed code runs before the operating system loads. For Windows devices this trust depends on a small set of Microsoft‑issued certificate authorities (CAs) and signing keys stored in the firmware variables commonly referred to as PK (Platform Key), KEK (Key Exchange Key), DB (allow‑list) and DBX (revocation list).
Those Microsoft CAs were issued around 2011 and were intentionally long‑lived, but certificate lifetimes are finite. The original 2011 Microsoft CA family is scheduled to begin expiring in June 2026 (with a related signing PCA expiration window following later in 2026). To prevent a security and compatibility gap, Microsoft and hardware partners issued a replacement CA family in 2023 and are now deploying those entries to firmware across in‑market devices through a combination of Windows cumulative updates and OEM firmware updates.
This is a platform‑level maintenance event with high stakes: if a device still relies solely on the 2011 certificates after they expire, it will continue to boot and operate, but it will enter a degraded security state that prevents the device from receiving future boot‑level fixes, revocation updates and other early‑boot mitigations. That makes the certificate refresh an operational priority for administrators, gamers, and users of specialized hardware alike.

Why this matters: the practical security and compatibility consequences​

Secure Boot protects the earliest phase of the software stack—the firmware, Option ROMs, the Windows Boot Manager, and other UEFI applications. Its protections include:
  • Preventing unsigned or tampered bootloaders and firmware drivers from executing.
  • Supporting BitLocker hardening and other pre‑boot integrity checks.
  • Serving as a trust anchor for third‑party components that rely on Microsoft’s boot signing (including many anti‑cheat solutions).
When the root CAs used to sign those components expire, three core problems follow unless the platform receives new, valid CA entries:
  • New boot‑level security fixes and revocations can no longer be applied to affected devices.
  • Future boot components signed under the new chain may be treated as untrusted, creating potential compatibility failures.
  • Attackers can exploit vulnerabilities discovered after the expiry window without the ability to deploy mitigations that rely on the now‑expired trust anchors.
Put simply: devices that aren’t updated won’t immediately break, but they will lose the ability to be maintained and hardened against newly discovered boot‑level threats. Over time that increases both security risk and the chance certain modern features and signed components will fail to load.

Who is affected​

  • Windows 11 devices that are in‑support and receive Microsoft‑managed updates are the primary target for automatic enrollment of the new 2023 CA family.
  • Windows 10 devices will receive the update only if they are enrolled in Microsoft’s Extended Security Updates (ESU) program; standard Windows 10 installations that are out of mainstream support will not be automatically updated.
  • Certain servers, embedded systems, IoT devices and highly managed or air‑gapped fleets may require OEM firmware packages or manual enrollment because firmware compatibility varies.
  • Machines with Secure Boot disabled are not affected by the firmware certificate injection process—however, they already lack Secure Boot protections and therefore remain exposed to pre‑boot threats.
  • Virtual machines and Hyper‑V guests may encounter update‑specific issues; Microsoft has documented scenarios and event IDs (for example, Event ID 1795) that can indicate problems during KEK/DB updates in virtualized environments.
For most consumer laptops and desktops bought in 2024 or later, OEMs already shipped the 2023 certificates preinstalled. Many systems shipped in 2025 also include the new CA entries, but older hardware and certain niche devices still require action.

How Microsoft and OEMs are rolling this out​

Microsoft is using a layered, cautious approach:
  • The 2023 CA family was prepared and shipped preinstalled on new devices starting in 2024.
  • For in‑market devices, Microsoft embedded the enrollment logic in recent cumulative updates (the January 2026 servicing updates and later) so the OS can attempt to inject the new certificates into firmware where the firmware supports it.
  • Enrollment is telemetry‑gated and phased: Microsoft targets devices that show successful update telemetry and firmware readiness signals, reducing the risk of mass disruptions.
  • When the OS cannot confidently apply the new entries, the update flow will require an OEM firmware (BIOS/UEFI) update to accept the keys.
  • Messages and status information about the update will appear in the Windows Security app in the coming months so end users can track progress.
The staged model is deliberate: Secure Boot changes happen at firmware level and can have cascading effects on boot flows and third‑party software. The telemetry gating lets Microsoft and OEMs enroll devices that demonstrate safe behavior first, while giving administrators time to prepare more delicate environments.

How to check whether your device already has the new 2023 certificates​

Start with the basics: confirm Secure Boot is enabled. Then verify the presence of the 2023 CA strings in the firmware key stores.
Quick GUI check (Windows 11):
  • Open Settings → Privacy & security → Windows Security → Device security.
  • Under Secure Boot, confirm the state (On/Off). If Secure Boot is Off, the certificate enrollment path is not applicable for that device.
PowerShell (recommended for accurate verification; run as Administrator):
  • Confirm Secure Boot is enabled:
  • Confirm-SecureBootUEFI
  • A return of True means Secure Boot is active.
  • Inspect the firmware DB for the 2023 certificate family:
  • Run:
    [System.Text.Encoding]::ASCII.GetString((Get‑SecureBootUEFI db).bytes) -match 'Windows UEFI CA 2023'
  • If the command returns True, the DB contains the 2023 CA string.
  • Inspect KEK and DBX similarly if you need to cross‑check for KEK 2023 entries:
  • [System.Text.Encoding]::ASCII.GetString((Get‑SecureBootUEFI kek).bytes) -match 'Microsoft Corporation KEK 2K CA 2023'
Registry diagnostics (machine‑level progress indicators):
  • Check HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecureBoot\Servicing for keys like UEFICA2023Status and WindowsUEFICA2023Capable. These values can show NotStarted → InProgress → Updated transitions or surface specific error codes.
For fleet-wide verification, script the above PowerShell checks across devices with Intune, ConfigMgr, PowerShell Remoting or your preferred management tooling and aggregate results into compliance dashboards.

Step‑by‑step remediation and best practices​

If your device does not show the 2023 certificates, follow this prioritized plan:
  • Keep the device on standard Microsoft updates
  • Ensure Windows Update is enabled and the latest cumulative updates and servicing stack updates (SSUs) are applied, including the January/early‑2026 packages that contain the enrollment tooling.
  • Check for OEM firmware updates
  • Visit your device or motherboard vendor’s support site and confirm the latest BIOS/UEFI version is installed. Some models require a firmware update so the platform will accept the OS‑driven certificate write.
  • Verify and apply the certificate enrollment
  • After applying the necessary cumulative and firmware updates, the Windows scheduled task that checks the AvailableUpdates registry key runs every 12 hours and will attempt the enrollment on targeted devices. Reboot as needed.
  • BitLocker and recovery considerations
  • When applying firmware or UEFI updates, temporarily suspend BitLocker if instructed by the OEM or Microsoft guidance. That avoids unexpected recovery prompts or key protectors being invalidated during firmware writes.
  • Virtual machines and Hyper‑V
  • If you run Secure Boot for VMs, watch for Event ID 1795 during attempts to update the KEK or DB. Microsoft has indicated fixes and guidance for Hyper‑V environments and is scheduling related patches in March for certain virtualized scenarios.
  • For devices that cannot be updated
  • If OEM support ends and your firmware refuses to accept new CA entries, plan for hardware replacement or isolate those devices from sensitive networks. They will remain functional but progressively less secure.
  • Communications and phased deployment in enterprise
  • Pilot the enrollment on a representative set of hardware, monitor telemetry and known‑issue channels, then gradually expand the rollout. Use the Microsoft deployment playbook for device selection, reporting and remediation.

Special concerns for gamers, anti‑cheat, and multi‑boot users​

Many anti‑cheat systems and modern game launchers rely on Secure Boot and signed components to provide cheat‑free online experiences. If a platform rejects newer signed components due to missing CA entries, those anti‑cheat updates could fail to install or function, potentially blocking online play.
Linux distributions that rely on shim or vendor‑supplied shims are also affected: distro maintainers and OEMs have been preparing updated shims and packages, but custom multi‑boot configurations warrant testing before broad deployment.
Advice for gamers and enthusiasts:
  • Keep Windows and anti‑cheat software up to date.
  • Verify firmware compatibility and preinstall OEM updates if available.
  • Test any multi‑boot or custom bootloader scenarios in a safe environment before rolling to your primary machine.

Risks, failure modes, and what can go wrong​

  • Firmware write failures: Some older UEFI implementations may reject writes to KEK/DB/DBX due to bugs or write protection. Those devices need OEM BIOS updates; if none exist, the device may be unpatchable for Secure Boot updates.
  • Virtual machine updates: KEK or DB updates can fail in virtualized environments if the virtual firmware refuses the change. Expect vendor guidance and patches explicitly aimed at hypervisor workflows.
  • BitLocker recovery prompts: Firmware updates can trigger recovery if BitLocker is active and TPM/Platform Key state changes. Suspend BitLocker or follow vendor instructions to avoid disruption.
  • Third‑party drivers and Option ROMs: Certain legacy Option ROMs or firmware drivers may be affected by a change in trust anchors. Validate critical peripherals and custom drivers before mass deployment.
  • Delayed adoption in managed environments: WSUS, offline networks and tightly controlled update rings can delay enrollment. Administrators must proactively approve and stage the necessary KBs and firmware packages.

Recommended timeline and priorities​

  • Immediately (this week)
  • Confirm Secure Boot state on critical systems.
  • Apply the latest cumulative updates and servicing stack updates.
  • Inventory devices that lack the 2023 CA entries.
  • In the next 30 days
  • Coordinate with OEMs to obtain firmware updates for models that require them.
  • Pilot the enrollment on a small, representative set of systems.
  • Script and collect verification results via Intune/ConfigMgr/powershell.
  • Before June 2026
  • Ensure as many systems as possible have received the 2023 CA entries prior to the beginning of the 2011 CA expiration window.
  • For devices that cannot be updated, plan replacements or operational mitigations.
Treat this as an infrastructure maintenance project akin to large firmware or BIOS rollouts: inventory, pilot, remediate, and document.

What Microsoft and OEM collaboration means for end users​

Microsoft’s public guidance emphasizes collaboration with OEMs — a critical point because the certificate injection is often a joint OS/firmware process. OEMs shipped 2023 certificates on many new devices starting in 2024, and most systems shipped during 2025 already include the new trust anchors.
For most consumers who allow automatic updates, the update will be invisible: the OS will apply the enrollment in a monitored, phased manner. For IT administrators, Microsoft published playbooks and PowerShell scripts to verify and manage fleet readiness, along with monitoring event logs and registry indicators to track progress.
The practical takeaway: follow the update guidance, check OEM support pages for firmware instructions, and validate using the PowerShell checks above.

Critical analysis: strengths and remaining risks​

Strengths
  • Microsoft’s staged, telemetry‑gated approach is prudent. Secure Boot changes can have outsized impact, and the phased model minimizes the chance of mass regressions.
  • Early delivery of the 2023 CA family to new devices in 2024–2025 reduced the number of impacted endpoints and simplifies the in‑market rollouts.
  • The availability of clear verification steps (PowerShell, registry indicators) and an IT playbook gives administrators the tools needed to manage the transition at scale.
Risks and gaps
  • Firmware diversity remains the central risk. Devices with unmaintained or poorly implemented UEFI firmware may be unable to accept the new CA entries, leaving them exposed after the 2011 certificates expire.
  • Environments that block diagnostic telemetry, rely on WSUS without manual approval, or are air‑gapped could miss the automatic enrollment and require manual intervention—something not all teams are prepared to handle.
  • Virtualized environments and certain Hyper‑V scenarios have already shown update failures; reliance on host/hypervisor patching schedules can complicate timelines.
  • The industry still faces a small but meaningful chance of unanticipated incompatibilities with third‑party bootloaders, custom security stacks, or peripheral firmware that depends on the older trust anchors.
Bottom line: the plan and tooling look robust, but the heterogeneity of PC firmware and diverse update policies in enterprise environments mean administrators should treat the refresh as a scheduled maintenance project rather than a background event.

Action checklist (concise)​

  • Confirm Secure Boot is enabled (Settings → Device security or Confirm‑SecureBootUEFI).
  • Run the PowerShell DB/KEK checks to look for Windows UEFI CA 2023 and Microsoft Corporation KEK 2K CA 2023.
  • Apply the latest cumulative and servicing stack updates (January 2026+ packages that contain enrollment logic).
  • Check OEM support pages and apply firmware updates where required.
  • For BitLocker‑protected systems, suspend BitLocker during firmware writes as recommended.
  • Pilot on a small set of representative devices and monitor event logs (watch for Event ID 1795).
  • For managed fleets, push scripts to inventory Secure Boot state and report compliance.
  • For VMs and Hyper‑V hosts, follow vendor guidance and apply any hypervisor patches scheduled for March.

Final assessment​

Microsoft’s Secure Boot certificate refresh is a well‑timed, necessary operation to preserve the integrity and maintainability of Windows’ early boot environment. The vendor ecosystem including major OEMs is aligned and has been preparing for this change for months. For most users on modern hardware with Windows Update enabled, the process should be automatic and seamless.
That said, the update exposes the perennial fault line of PC security: firmware diversity. Administrators and power users must proactively verify their device fleets, install OEM firmware where required, and treat the update as a firmware plus OS maintenance cycle. The safest path is straightforward—apply updates now, verify the 2023 CA presence, and remediate devices that fail to enroll. Doing so will preserve Secure Boot as a reliable defense and avoid the slow erosion of pre‑boot protections that would follow if the legacy certificates are allowed to lapse on unprepared devices.

Source: FilmoGaz Microsoft to Refresh Secure Boot Certificates for Windows 11 and 10 in March
 

Microsoft is quietly rolling out a replacement for long‑lived Secure Boot certificates first issued in 2011, and while Microsoft and OEMs say most modern PCs will receive the new 2023 certificate family automatically, a material minority of systems—especially unmanaged Windows 10 machines not on extended servicing paths, air‑gapped endpoints, and devices with out‑of‑date firmware—face a real risk of losing future boot‑level protections when the old certificates expire in mid‑ and late‑2026.

A modern PC motherboard with a glowing shield labeled 'Secure Boot' and UEFI graphics.Background​

Secure Boot has been a core UEFI firmware feature since the Windows 8 era. It enforces a cryptographic chain of trust at the earliest stage of platform startup, verifying signatures on firmware option ROMs, EFI applications, third‑party bootloaders, and the Windows Boot Manager before handing control to the operating system. The mechanism depends on a few on‑platform trust stores—PK (Platform Key), KEK (Key Exchange Key), DB (allowed signatures), and DBX (revoked signatures)—and on a small number of Certificate Authority (CA) certificates baked into firmware.
Three Microsoft‑issued CAs that have been widely provisioned to OEM firmware since around 2011 are scheduled to expire in calendar windows during 2026: two entries begin expiring in June 2026, and a production PCA used to sign the Windows boot manager expires in October 2026. Microsoft and major OEM partners prepared a replacement set—the 2023 CA family—to preserve Secure Boot continuity and enable future DB/DBX updates and boot‑loader signing.

Why certificate expiry matters​

Certificates are not cosmetic; they are the trust anchors that let firmware accept signed updates and validate new binaries. When the CA entries in KEK or DB expire, firmware will no longer accept new Microsoft‑signed DB/DBX updates or validate components signed under the new CA. Practically speaking, a device that still relies on the expiring 2011 keys after the deadline will continue to boot and run, but it will no longer be able to receive future boot‑level protections from Microsoft—most notably DBX revocations and Windows Boot Manager updates—which gradually leaves the earliest stage of the platform more vulnerable to modern bootkits and pre‑OS attacks.

What Microsoft shipped and how it’s being delivered​

Microsoft’s remediation has two principal delivery channels:
  • Preinstalled firmware (UEFI/BIOS) updates from OEMs that include the 2023 CA family in the firmware DB/KEK on shipping units or as a firmware update for older models.
  • An OS‑side, telemetry‑gated enrollment path delivered via Windows servicing packages (cumulative updates) that can add the 2023 certificates into UEFI variables on systems where the platform accepts such changes.
The Windows servicing approach is intentionally conservative. Microsoft included logic in January servicing cycles (notable servicing packages have been referenced publicly) that only performs automatic enrollment on devices that meet “sufficient successful update signals” to lower the risk of applying changes to hardware that cannot accept them. Administrators retain manual options for managed fleets through documented enterprise workflows.

What changed in the certificate design​

The 2023 certificate family is not a one‑for‑one replacement: Microsoft split and restructured some trust roles to reduce blast radius and give administrators and OEMs finer control. Key highlights:
  • The old Microsoft KEK CA 2011 is replaced by Microsoft Corporation KEK 2K CA 2023 to authorize DB/DBX updates.
  • The singular UEFI CA role was split into Microsoft UEFI CA 2023 (for EFI apps and third‑party bootloaders) and Microsoft Option ROM UEFI CA 2023 (for option ROMs).
  • The PCA used to sign the Windows bootloader is being replaced with Windows UEFI CA 2023.
This split reduces the scope of trust conferred to option ROMs versus bootloaders and allows future policy decisions to restrict which classes of pre‑OS code are implicitly trusted by default. That design is a security improvement in principle, but it also increases the coordination surface for OEMs and IT teams during rollout.

Who is affected — and who should worry​

The transition will be seamless for the majority of up‑to‑date consumer and enterprise devices, but several clearly identifiable groups should treat this as a time‑sensitive operational task:
  • Fully patched Windows 11 devices and newer 2024+ hardware: Most of these shipped with or will receive the 2023 certs automatically and should see no disruption.
  • Windows 10 devices on supported servicing paths (Consumer ESU or enterprise servicing): Microsoft is distributing the enrollment logic to Windows 10 systems that remain on supported servicing branches (for example, Consumer ESU enrollees), but the path is narrower than for Windows 11. Unenrolled, unsupported Windows 10 installations may not be on the automatic update path and therefore risk missing the OS‑side enrollment.
  • Air‑gapped, heavily‑locked, or managed offline endpoints: These devices may not be able to accept OS‑driven enrollment and will need OEM firmware updates applied manually.
  • Older hardware with abandoned firmware: If the OEM never provides a firmware update and the device cannot take the OS‑side enrollment, it will remain dependent on the expiring 2011 CAs. Over time such devices become increasingly risky.
  • Gamers and systems using anti‑cheat stacks tied to Secure Boot: Anti‑cheat and integrity mechanisms often rely on updated Secure Boot behaviors. Machines that fail to accept the new certs risk compatibility issues—ranging from refusal to launch protected multiplayer sessions to failing vendor checks—if those components are re‑signed under the 2023 PCA.
In short: if your device is kept up to date and is connected to the internet, you’re likely safe. If it’s an older Windows 10 machine, offline endpoint, or otherwise unmanaged, treat this as an operational deadline.

The technical risk: what exactly degrades​

A device that misses the 2023 certs will still boot normally the day the old CAs expire, but it will lose the ability to:
  • Receive new DBX (revocation) updates that revoke compromised or malicious pre‑OS binaries.
  • Accept future Windows Boot Manager updates signed under the new PCA.
  • Receive other future boot‑level hardening fixes Microsoft might deploy.
  • Trust newly signed third‑party pre‑OS components if those components are signed only under the 2023 CAs.
Over time this means that newly discovered bootkits or UEFI threats cannot be mitigated by pushing revocations or bootloader fixes, and features that rely on up‑to‑date boot integrity (such as enhanced BitLocker hardening) may be weakened on those devices. That’s the operational definition Microsoft uses when it says a device will be in a “degraded security state.”

Strengths of Microsoft’s approach​

  • Planned, staged rollout reduces risk — Microsoft’s telemetry‑gated enrollment and phased approach aim to avoid a mass‑device regression by applying changes only to devices that demonstrate update health. This reduces the chance of widespread bricks or compatibility failures.
  • Certificate split reduces blast radius — Separating option ROM signing from bootloader signing lets OEMs and admins limit trust scope, improving security posture in aggregate.
  • Multiple delivery vectors — Combining OS‑side injection and firmware updates gives OEMs and Microsoft two ways to remediate older hardware, increasing the probability that devices will be protected by the deadline.

Real risks and gaps: why this could go wrong​

  • Windows 10 servicing fragmentation: Windows 10 mainstream support ended previously, and only a subset of systems are eligible for continued servicing paths. Devices left on unsupported Windows 10 builds risk being bypassed by the automated enrollment, putting home users and SMBs at particular risk if they did not opt into extended servicing.
  • OEM firmware lag and abandoned models: Some OEMs will provide BIOS/UEFI updates; others may not. On devices where firmware updates are absent and OS‑side enrollment is blocked (for example, firmware that disallows KEK writes), there is no clear fall‑back. That creates a durable class of vulnerable devices.
  • Edge cases with anti‑cheat and signed third‑party components: Vendors that re‑sign components under the 2023 CA may create compatibility mismatches for devices that haven’t received the updated certs, leading to functional breakage—especially for modern game anti‑cheat stacks that enforce boot‑time integrity. Gamers and pro‑gaming rigs should be proactive.
  • Operational opacity: The enrollment uses telemetry gating; administrators who prefer deterministic rollouts may find the health checks opaque and need to rely on manual deployment tools. This raises practical complications in large, heterogeneous fleets.
  • Miscommunication risk: The messaging that “devices will keep booting” can be misread as “nothing to do.” In reality, the lack of immediate failure masks a progressive security gap that small IT teams or home users may overlook until a new threat or compatibility issue appears.

Practical, prioritized actions for readers​

Below are clear, sequential steps tailored for different audiences. Follow them in order and document results.

For home users and gamers​

  • Ensure Windows Update is enabled and fully applied. Install the latest cumulative updates available for your version of Windows. This is the first—and for many—sufficient step.
  • Confirm Secure Boot is enabled in UEFI/BIOS. Many modern Windows installations use Secure Boot by default; if you disabled it previously (for legacy OS installs or unsupported drivers), evaluate re‑enabling if possible.
  • Check OEM support pages for BIOS/UEFI updates and apply firmware updates if available. If your OEM publishes a specific advisory or update for Secure Boot certificate enrollment, follow their instructions.
  • Gamers: update anti‑cheat software, game clients, and confirm vendor advisories. If a game vendor issues guidance about Secure Boot certificates or compatibility, follow their remediation steps and schedule.
  • If you run BitLocker, ensure you have current recovery keys stored securely off‑device and test recovery workflows—major changes in early boot behavior can surface recovery prompts.

For IT admins and fleet managers​

  • Inventory and classify devices: Secure Boot status, OEM model and firmware revision, Windows version and servicing state, network‑connectivity status (air‑gapped vs managed online). This is the critical first deliverable.
  • Prioritize devices that are offline, air‑gapped, running unsupported Windows 10 builds, or use anti‑cheat or OEM‑specific pre‑boot components. These are highest risk.
  • Pilot the OS‑side enrollment on representative hardware and monitor results closely. Use vendor test plans and have rollback/recovery steps documented.
  • Coordinate firmware updates with OEMs where necessary. Apply BIOS/UEFI updates in a controlled maintenance window, and validate that the new 2023 CA entries appear in PK/KEK/DB as expected.
  • Update compliance policies and scanning rules to look for presence of the 2023 CAs, and include those checks in vulnerability and configuration management tooling.

Tools and checks (administrative)​

  • On Linux/UEFI systems, tools like efivar can enumerate UEFI variables; on Windows, consult vendor‑specific management tools or Windows servicing logs to confirm enrollment status. If you cannot confirm using your standard tooling, contact OEM support.

What to watch for in the months ahead​

  • Microsoft’s phased rollout schedule and telemetry gating signals—watch for servicing announcements and KB references tied to the enrollment logic. Administrators should plan for the June 2026 and October 2026 expiry windows as operational deadlines.
  • OEM advisories for models in your fleet—some vendors have published day‑level expiration guidance for specific product families; treat those as authoritative for your hardware.
  • Anti‑cheat or third‑party boot‑time software vendor notices—gamers and competitive platforms may publish compatibility statements or forced updates that require the presence of the 2023 certs.
  • Evidence of devices that cannot accept OS‑side enrollment—collect these early so you can escalate to OEM channels for firmware updates before the expiry date.

Critical appraisal: the tradeoffs Microsoft chose​

Microsoft’s approach balances safety and practicality. The telemetry‑gated OS‑side enrollment reduces the chance of mass regressions, and the certificate split is a security forward step. However, those same design choices force a reliance on Windows Update and OEM cooperation—both brittle in environments with unmanaged machines or abandoned firmware.
From a platform security perspective, rotating CA keys is the correct practice; cryptographic lifetimes expire and must be refreshed. The hard part is operational: this refresh is a cross‑industry coordination event that requires timely action from Microsoft, OEMs, enterprise IT teams, and end users. The danger is not an immediate catastrophic failure but a slow erosion of early‑boot protections that is easy to ignore until a concrete problem—an anti‑cheat refusal, a BitLocker recovery, or a discovered bootkit—forces remediation under pressure.

Unverifiable or uncertain claims — a caution​

  • Some public writeups have cited precise day‑level expiry dates per OEM; those can vary by model and vendor. Where exact day precision matters for operations, confirm with your OEM’s support documentation—vendor calendars are the authoritative source for hardware‑level specifics.
  • The exact set of KB numbers and servicing package names responsible for the broad rollout may evolve as Microsoft continues servicing cycles; administrators should rely on Microsoft’s official support articles and corporate change logs for the canonical package identifiers. If you rely on community posts for KB references, cross‑verify with Microsoft’s published KBs.

Checklist — immediate actions (one page)​

  • [ ] Ensure all devices have latest cumulative updates applied.
  • [ ] Inventory Secure Boot status and firmware versions across fleet.
  • [ ] Apply firmware updates from OEMs where available.
  • [ ] For Windows 10: verify eligibility for supported servicing or Consumer ESU paths if you want OS‑side enrollment.
  • [ ] Ensure BitLocker recovery keys are backed up and test recovery workflows.
  • [ ] Pilot enrollment on representative hardware and document rollback procedures.

Final verdict — what readers should take away​

This Secure Boot certificate refresh is one of the largest cross‑industry maintenance events for Windows platform security in recent memory. The good news is that Microsoft and OEMs have prepared both the new certificate family and multiple delivery mechanisms so that most users who keep Windows and firmware current will transition automatically and without incident.
The bad news is that the update surface includes many edge cases—unsupported Windows 10 installs, offline and air‑gapped machines, older hardware with no firmware updates, and certain gaming anti‑cheat stacks—that require proactive management. For those systems, the expiry windows in June and October 2026 are practical operational deadlines: devices that still only contain the 2011 CA entries when those dates arrive will lose the ability to receive new boot‑level protections and may face compatibility issues down the road.
If you manage Windows hardware or value system integrity (and any user who relies on BitLocker, modern games with anti‑cheat, or enterprise compliance should), start your inventory and remediation planning now. Install updates, coordinate firmware patches with OEMs, and pilot the enrollment flow so you move from a potential problem into a controlled, auditable transition. The change preserves a cornerstone of platform security—but only if vendors, administrators, and end users treat the operation as the coordinated maintenance task it is.
In short: keep your systems patched, check for firmware updates, and don’t be lulled by “it still boots” into ignoring a quietly accumulating risk—because preserving Secure Boot’s protections now is cheaper than recovering from a successful pre‑OS compromise later.

Source: TechRadar Microsoft's Secure Boot replacements could be bad news for Windows 10 users
Source: PCMag Windows 10 Security Alert: Do This Now to Reduce Your Risk of Being Hacked
Source: digit.in Securing the boot: Why Microsoft is updating 15 year old security keys
 

Microsoft has quietly sounded the alarm: the Secure Boot certificates that underpin the Windows platform’s pre-boot trust model are reaching the end of their planned lifespan this year, and organizations and consumers alike need to act now to avoid degraded boot security, compatibility problems, and the loss of critical pre‑boot updateability.

Glowing UEFI chip and Secure Boot shield mark a 2026 timeline from trust anchors to pre-boot signings.Background / Overview​

Secure Boot was introduced as part of the UEFI platform to stop unauthorized code from running during the earliest phases of system start‑up. For Windows, device manufacturers have relied on a small set of Microsoft‑issued certificate authorities (CAs) placed in firmware since 2011 to sign and validate boot loaders, drivers, option ROMs, and revocations. Those 2011 certificates—the set deployed widely across the OEM ecosystem—are now approaching expiration in 2026. Microsoft has issued new 2023 certificates and begun a controlled rollout so devices can migrate before the old CAs stop accepting updates.
This is not a cosmetic housekeeping task. When the old certificates expire, the firmware-level trust anchors will no longer accept updates to the Secure Boot signature database (DB) or the revoked signature database (DBX), and Microsoft warns that Windows devices left on expiring CAs would be unable to receive or apply security fixes for pre‑boot components. In short: if your device does not adopt the new certificates before the old ones expire, its boot‑time security posture and serviceability could be compromised.

What exactly is expiring — and when?​

The expiring certificates​

Three Microsoft-supplied certificates used across many Windows PCs are the focus of the renewal:
  • Microsoft Corporation KEK CA 2011 — stored in the KEK (Key Exchange Key) UEFI variable; used to sign updates to DB and DBX.
  • Microsoft Corporation UEFI CA 2011 — stored in DB; used to sign third‑party boot loaders, EFI applications and option ROMs.
  • Microsoft Windows Production PCA 2011 — stored in DB; used to sign the Windows boot loader and Windows-specific boot components.
Microsoft’s guidance indicates these 2011 certificates will begin expiring in June 2026 (with one of the certificates expiring as late as October 2026). To replace them Microsoft issued a matched set of 2023 certificates (for example, Microsoft Corporation KEK 2K CA 2023, Windows UEFI CA 2023, Microsoft UEFI CA 2023, and Microsoft Option ROM UEFI CA 2023) and is rolling those out to devices.

Why a staggered rollout matters​

The UEFI environment and the broad diversity of hardware and firmware implementations mean certificate churn must be handled conservatively. Microsoft’s approach is a phased, telemetry‑informed deployment that limits updates to devices that have demonstrated safe update telemetry, reducing the risk of wide‑scale firmware incompatibilities. However, that cautious approach also creates an operational window during which older devices may not yet have received the new certs — and that’s precisely the period that needs management by IT teams.

Why this matters: a primer on Secure Boot trust elements​

To understand the implications, you need a quick primer on Secure Boot’s core variables:
  • PK (Platform Key) — controlled by the OEM; links firmware owner to the firmware trust model.
  • KEK (Key Exchange Key) — a CA that authorizes changes to the DB and DBX; new KEK certs are used to sign updates to those databases.
  • DB (Signature Database) — contains certificates and hashes of binaries allowed to run at boot.
  • DBX (Revoked Signature Database) — contains signatures and hashes that are explicitly banned.
When Microsoft signs a critical pre‑boot component (a boot loader patch or a revocation list), that signature is vetted against the CA certs in DB/KEK. Expired CA certs cannot be used to validate subsequent signature updates, and a DBX that cannot be updated means Microsoft cannot revoke compromised boot components going forward.

How Microsoft is handling the renewal​

Microsoft’s plan is multi‑pronged and cautious:
  • New 2023 CA certificates were created to replace the 2011 CAs and enable future signing of boot components and DB/DBX updates.
  • Microsoft is delivering those certificates via Windows quality updates in a staged fashion; certain January/February 2026 cumulative updates introduced targeting metadata and mechanisms to safely enroll devices.
  • Devices that recently shipped with updated firmware (many shipped in 2024 and 2025) already include the 2023 certs from the factory.
  • For older hardware, Microsoft’s servicing pipeline will apply certificate updates automatically to devices that meet the eligibility criteria and show stable update telemetry.
  • For systems that are not managed by Microsoft‑managed updates (or for specialized hardware such as some servers, embedded systems, or IoT devices), OEM firmware updates or manual administration may be required.
The fundamental message: Microsoft intends to manage the bulk of migration for consumer and managed enterprise devices, but the responsibility still falls to device owners and IT admins to verify their inventories, test updates, and coordinate with vendors where firmware intervention is necessary.

Who is at risk?​

Devices that are most likely to need action​

  • Older Windows PCs manufactured since 2012 that have not received targeted certificate updates.
  • Servers, industrial systems, ATMs, medical devices, and embedded/IOT devices that either: (a) run custom vendor firmware, (b) are air‑gapped/offline, or (c) are intentionally excluded from Microsoft-managed update channels.
  • Virtual machines that use virtualized UEFI firmware images whose embedded CA set is out of date.
  • Dual‑boot systems and non‑Windows operating systems that rely on Microsoft‑signed shim/boot components to chainload (older shims and boot managers may rely on the older Microsoft UEFI CA).

Devices less likely to be affected​

  • Newer PCs shipped since 2024 that already include the 2023 certs.
  • Devices that receive regular Microsoft updates and have demonstrated stable update telemetry; the phased rollout aims to auto‑enroll these systems.
  • Systems enrolled in modern update management services that can apply Microsoft’s certificate updates.

Special cases and caveats​

  • Not all firmware implementations behave identically. Some platform vendors do not include Microsoft’s UEFI CA 2011 in their shipped DB; for those machines Microsoft recommends applying both 2023 UEFI CA variants (the standard UEFI CA and the Option ROM UEFI CA) only where necessary.
  • Virtualized environments: many hypervisor platforms use vendor‑supplied virtual firmware (OVMF/virtual UEFI) that may need to be updated. Shielded/secure VMs and some cloud offerings already support Secure Boot—but their firmware must be validated.

Known and potential real‑world impacts​

Microsoft’s initial updates that prepared devices for the Cert rotation were included alongside large security patches earlier in 2026. The staged rollout approach is intended to minimize disruption, but real‑world issues already reported around that update cycle provide useful cautionary examples:
  • Some cumulative updates that added the Secure Boot enrollment targeting metadata were subsequently associated with a limited set of boot failures on devices with particular firmware combinations. Microsoft acknowledged a limited number of boot‑related incidents while emphasizing the phased rollout and targeted nature of the changes.
  • Legacy hardware—especially devices that rely on old option ROMs, unsigned boot components, or outdated boot managers—may see compatibility problems if the new certs are not applied or if vendor firmware refuses to accept the update.
  • Older Linux distributions or custom boot chains that rely on older shims or Microsoft‑signed binaries might fail to load if their chain of trust is broken by expired CA certs or by tightened DB/DBX behavior on updated devices.
These impacts underscore why the migration is both urgent and operationally sensitive: the transition can create compatibility edges where boot loaders, drivers, or firmware modules behave differently, requiring testing and vendor coordination.

Practical checklist: what IT teams should do now​

Managing this change across fleets requires planning, testing, and some decisive action. The following steps form a pragmatic, prioritized checklist for IT professionals.
  • Inventory and classify devices.
  • Identify devices manufactured since 2012 and flag machines with custom, vendor‑locked, or offline update processes.
  • Pay special attention to servers, embedded devices, vendor appliances, and VMs.
  • Determine update eligibility and current state.
  • Confirm that devices are receiving Windows quality updates (and are on supported Windows releases).
  • For Windows 10 devices, determine whether the device is enrolled for Extended Security Updates (ESU); ESU enrollment may be necessary to receive the certificate rollout on end‑of‑life systems.
  • Test in a lab environment.
  • Create representative test groups that include older firmware revisions and any vendor‑specific configurations.
  • Validate that boot and recovery workflows continue to function after applying the Windows cumulative updates that include Secure Boot enrolment metadata.
  • Deploy in phases and monitor.
  • Use your management tooling (WSUS, Intune, SCCM, or third‑party patch managers) to stage the certificate updates, mirroring Microsoft’s phased approach.
  • Monitor update telemetry, boot health, and device logs for anomalies.
  • Coordinate with OEMs and ISVs.
  • Open tickets with hardware vendors for any systems that refuse the certificate updates or exhibit boot regressions.
  • Confirm firmware updates where vendors have published guidance and deliver patches.
  • Special handling for isolated or air‑gapped systems.
  • Build an offline update plan: obtain certificates and signed updates through vendor channels and execute a controlled enrollment process.
  • Document fallback procedures: how to boot in recovery mode or to temporarily disable Secure Boot if absolutely necessary (only as a last resort).
  • Communicate and document.
  • Inform stakeholders about the migration timeline, especially for systems supporting critical services.
  • Maintain runbooks: procedures for recovery, vendor escalation contacts, and acceptance criteria.

Steps consumers and small businesses should take​

  • Check whether Secure Boot is enabled: on Windows, a simple PowerShell check running as administrator (for example, Confirm-SecureBootUEFI) will indicate whether Secure Boot is active.
  • Keep Windows updated: ensure you install cumulative updates and monthly quality updates. Microsoft’s servicing pipeline is designed to deliver the 2023 certificates automatically to eligible devices.
  • If you use older hardware or rely on specialized peripherals (legacy modems, custom PCI option ROMs), consult your OEM or vendor support site for firmware advisories.
  • If you’re running Windows 10 and did not upgrade, investigate Microsoft’s Extended Security Updates (ESU) options to maintain support through the transition window.
  • Back up important data and create a recovery plan—while broad disruption is not expected for the majority of consumer PCs, a robust backup and recovery posture mitigates the impact of any device-specific boot issues.

The technical tradeoffs and risk analysis​

Strengths of Microsoft’s approach​

  • Proactive renewal: rotating aging CAs is standard cryptographic hygiene. Newer keys and stronger cryptographic parameters reduce long‑term attack surface.
  • Phased, telemetry‑driven deployment: reduces the risk of a catastrophic global firmware incompatibility by targeting devices that have shown reliable update behavior.
  • Separation of duties: splitting option ROM signing from third‑party boot loader signing in the 2023 certificates gives finer control and limits the blast radius of compromised third‑party components.

Weaknesses and exposures​

  • Operational complexity: the combination of Windows updates, OEM firmware, and third‑party boot chains creates a fragile surface where an update in one layer can interact badly with another.
  • Legacy and offline systems: servers, embedded devices, and specialized equipment without frequent update cadence are likely to require manual intervention, increasing administrative burden and the risk of oversight.
  • Reporting and visibility gaps: organizations without robust asset inventories may be surprised by affected systems, particularly where virtualized firmware or vendor appliance images are in use.

Worst‑case scenarios to plan for​

  • Devices that cannot accept the 2023 certs and are left running expired CAs would be unable to receive DBX revocations. In the event of a boot‑time compromise of a signed pre‑boot component, Microsoft would not be able to block that component on those devices—creating a persistent attack surface.
  • A poorly tested, wide‑scale firmware incompatibility could cause boot failures that require device‑by‑device recovery, a logistical nightmare for large enterprises.

Vendor responsibilities and ecosystem coordination​

This certificate rotation is inevitably an ecosystem problem: Microsoft supplies the new CAs, but OEMs control firmware, and ISVs produce boot loaders and option ROMs. Successful migration depends on:
  • OEMs shipping firmware images that include or accept the 2023 certs.
  • Hypervisor and cloud providers updating virtual UEFI images and publishing guidance for Shielded/secure VM offerings.
  • Linux distributions and boot managers (shim/GRUB) ensuring compatibility with the new cert split, especially where Microsoft‑signed shim is the pathway to chainload unsigned kernels.
In practice, that means IT teams should treat vendor support as a first‑class task: open tickets, request firmware images, and demand validation matrices for affected hardware.

What we still don’t know (and what to watch)​

  • The exact volume of devices that will require manual firmware updates versus automated Windows‑delivered updates is not publicly enumerated. Expect variability by OEM and device class.
  • Some virtualized and specialized OEM firmware images may not yet be fully documented as to whether they will accept the 2023 certs without intervention.
  • While Microsoft’s telemetry‑driven rollout reduces risk, it also means some devices will receive updates later in the timeline—administrators must not assume “if it’s not broken, it’s fine.” Active verification is required.
Whenever a public statement is short on specifics, treat it as a signal to inventory and test rather than as reassurance that no action is required.

A practical, minimal remediation playbook (quick reference)​

  • Verify Secure Boot is enabled on your machines.
  • Confirm devices are on supported Windows releases and receiving quality updates.
  • Patch test groups first, observe boot and serviceability metrics, then broaden rollout.
  • Hold back updates for mission‑critical, poorly documented appliances until vendor guidance is received and firmware updates are available.
  • For Windows 10 devices that cannot be upgraded to Windows 11, enroll in ESU if you need the certificate updates and additional security coverage.
  • Document recovery procedures and maintain updated backups.

Conclusion​

This Secure Boot certificate rotation is a textbook example of how long‑lived cryptographic decisions can create a future operational risk. Microsoft is doing the right technical thing—rotating decade‑old CAs and providing a refined, split trust model to better separate boot loader and option ROM trust—but the work does not stop at issuing new certificates. The real challenge lies in the messy, heterogeneous reality of millions of devices: firmware idiosyncrasies, air‑gapped systems, virtualized environments, and legacy peripherals.
For administrators, the prescription is straightforward and urgent: inventory, test, and remediate now. For consumers, the simplest path is to keep Windows updated and to consult your OEM if you run older or specialized hardware. The alternative—waiting until mid‑to‑late 2026 when the old certs expire—risks eroding your ability to receive critical pre‑boot fixes and leaves your systems vulnerable to boot‑time compromises that will be increasingly difficult to mitigate.
This is a manageable problem, but only if the industry treats it as an operational priority rather than a background maintenance event. Start your inventory, test early, coordinate with vendors, and make the certificate refresh a scheduled item in your update playbook — because when trust anchors expire, the consequences are felt at the very start of every boot.

Source: HotHardware Microsoft Warns Of Secure Boot Certificate Expiry Impacting PCs This Year
 

Microsoft has issued an urgent security warning for Windows 10 users after revealing that the original Secure Boot certificates—first shipped in 2011—will begin expiring in June 2026, and that affected devices will need updated certificates or an active Extended Security Updates (ESU) enrollment to maintain full boot‑chain protections.

Cybersecurity scene: secure boot chain, Windows shield, and June 2026 calendar on a circuit board.Background​

Microsoft ended mainstream support for Windows 10 on October 14, 2025. That milestone removed routine, free security patching for the operating system, but Microsoft also introduced a short-term bridge for consumers and organizations: the Windows 10 Extended Security Updates (ESU) program. For consumers, ESU coverage runs through October 13, 2026; enterprises can purchase up to three years of ESUs under volume licensing.
Now there’s a second ticking clock. The cryptographic certificates used by Secure Boot to validate boot‑time components are aging out. Microsoft says the original certificates “begin expiring in June 2026,” and the company is pushing a coordinated update effort to install replacement certificates and associated anti‑rollback protections. The combination of an OS that has reached its end of mainstream life and expiring Secure Boot certificates raises new, practical risks for Windows 10 devices that aren’t patched or enrolled.

What exactly is expiring — and why it matters​

Secure Boot in plain terms​

Secure Boot is a platform mechanism—part firmware, part OS—that cryptographically verifies the integrity and authenticity of the code that runs before Windows starts. It was designed to stop unsigned or malicious bootloaders, drivers, or early‑stage boot malware from loading. Secure Boot uses certificates and key databases issued by certificate authorities and platform vendors to decide whether a piece of code is trusted.

The certificates are time‑bound​

Cryptographic certificates have lifetimes. Microsoft's original Secure Boot certificates were issued roughly 15 years ago and were never intended to live forever. When those certificates expire, affected devices do not suddenly “break” in the sense of being unable to turn on; however, they enter what Microsoft calls a degraded security state. That means the device may no longer be able to receive future protections for the early boot chain—no updates to the Secure Boot database, no new revocation lists, and no fixes aimed at boot‑level threats.
In practice, an expired certificate does two important things:
  • It prevents Microsoft from delivering new cryptographic protections for the boot process to that machine.
  • It reduces the platform’s ability to defend against newly discovered, sophisticated boot‑level attacks.
That combination is worrying because boot‑level vulnerabilities are among the hardest to detect and most powerful for attackers.

How Microsoft is addressing it​

Microsoft has prepared a “generational refresh” of Secure Boot certificates: a new certificate set issued in 2023 and rolled out through Windows updates and OEM firmware updates. Most devices shipped since 2024 already include the updated certificates. For older systems, Microsoft plans to deliver updates via Windows Update for eligible devices—but Windows 10 machines that are not enrolled in the consumer ESU program will not receive those certificate updates automatically after end of mainstream support unless they qualify for the ESU path.
Some systems—especially servers, appliances, and specialized IoT hardware—may also require vendor firmware updates. That’s because firmware (UEFI) stores the Secure Boot keys and databases; if the firmware doesn’t accept the updated Microsoft certificates or lacks a necessary firmware hook, the device owner must look to the OEM for a firmware-level remedy.

The timeline you must know (exact dates)​

  • October 14, 2025 — Microsoft ended mainstream support for Windows 10.
  • November 11, 2025 onwards — Microsoft has issued patches to enable ESU enrollment reliably and to repair enrollment bugs for some devices.
  • June 2026 — Microsoft’s original Secure Boot certificates begin expiring.
  • October 13, 2026 — Consumer ESU coverage window ends (devices enrolled in ESU will receive critical and important security updates through this date).
  • For commercial customers, ESU may be purchased and renewed for up to three years beyond end of support under the enterprise licensing model.
Use these absolute dates as planning anchors: ambiguous phrases like “next year” or “in a few months” are easy to misread; your action plan should be tied to the calendar dates above.

Who is at risk — and who is safe​

  • At risk: Windows 10 devices that are not enrolled in ESU and have not received Microsoft’s certificate refresh will see degraded Secure Boot protections after the certificates expire. Old consumer PCs and many corporate devices that weren’t upgraded to Windows 11 are the most exposed group.
  • Less at risk: Devices manufactured in 2024 or later frequently shipped with the updated certificates already included; newly purchased Windows 11 PCs also receive the refresh automatically.
  • Special cases: Servers, embedded systems, custom images, and some enterprise appliances may need manual firmware updates from the vendor. Virtual machines hosted in Microsoft Azure, Windows 365 cloud PCs and some cloud VMs may receive ESU entitlement automatically through the hosting platform under Microsoft’s terms.

Why you should care more than "it will still boot"​

It’s tempting to read Microsoft’s explanation—“the device will still start and operate normally”—as permission to ignore this. Don’t. The worst security failures are the ones you can’t see. If a device cannot receive future Secure Boot protections, attackers who find new boot‑level vulnerabilities can exploit that device more easily and evade conventional defenses. Over time the risk compounds: the longer a device stays deprioritized for early‑boot updates, the more attack surface accumulates.
Especially for systems that hold sensitive data, are used for remote access, or serve as admin consoles, the degraded Secure Boot state materially increases exposure.

Microsoft’s consumer ESU: how it works (the options)​

Microsoft created a consumer‑focused ESU enrollment wizard in Windows 10 settings. Consumer devices running Windows 10, version 22H2 and with the necessary updates installed can enroll in ESU by one of three methods:
  • Free option: Use Windows Backup to sync your PC settings to OneDrive (the free Windows Backup method). This requires a Microsoft account and will use the free 5GB OneDrive allocation unless you buy more storage.
  • Rewards option: Redeem 1,000 Microsoft Rewards points to cover the ESU license.
  • Paid option: Make a one‑time purchase of $30 USD (local pricing may vary) to activate ESU for that Microsoft account; the entitlement can be used on up to 10 devices tied to the same account.
Enrollment is tied to your Microsoft Account (a work or school account usually isn’t eligible for the consumer path), and devices in managed enterprise environments or joined to Active Directory typically must use commercial ESU licensing instead.
Important consumer caveats:
  • The free OneDrive option requires a Microsoft account and uses cloud storage—if your device has a lot of backup data you may hit Microsoft’s 5GB free cap and be pushed toward paid OneDrive storage.
  • European Economic Area (EEA) consumers have different enrollment rules as a compliance exception under regional regulation; in some EEA cases Microsoft is offering ESU without the Windows Backup requirement. If you’re in the EEA, check your Settings message carefully for the enrollment wording.
  • Consumer ESU is a one‑year bridge only. Businesses and schools can extend for additional years via volume licensing.

Step‑by‑step: How to prepare and enroll (consumer checklist)​

Follow this checklist in order. If you manage multiple devices, run through these steps on each eligible PC.
  • Confirm your Windows version:
  • Press Win+R, type winver, and press Enter. You must be on Windows 10, version 22H2 to use the consumer ESU path.
  • Install required updates:
  • From Settings → Windows Update, click Check for updates and install everything available. Important patches released in August and November 2025 addressed ESU enrollment reliability; ensure those are applied.
  • Be signed in with a Microsoft Account:
  • Consumer ESU enrollment requires a Microsoft account that is an administrator on the device. Local-only accounts are not eligible for enrollment.
  • Find the ESU enrollment link:
  • In Settings → Windows Update, look for the enrollment banner in the top‑right area or an Enroll in Extended Security Updates link. If you don’t see it:
  • Reboot and run Windows Update again.
  • Verify that the out‑of‑band patch to fix enrollment issues has been applied (Microsoft released targeted fixes if you had problems earlier).
  • Choose your enrollment method:
  • Select Back up your PC settings (free), Redeem 1,000 Rewards points, or Purchase for $30.
  • Complete the wizard:
  • Follow on‑screen prompts; the entitlement ties to your Microsoft account and can cover multiple eligible devices.
  • Verify enrollment:
  • After enrollment, run Windows Update and confirm that monthly Extended Security Updates appear and install. If you don’t see updates, check update history and the Windows Update page for ESU status messaging.
If the enrollment wizard is missing or fails: ensure you’ve installed the late‑2025 fixes that Microsoft published to address enrollment failures (these were released as out‑of‑band updates). If the problem persists, check for a servicing stack update and any optional cumulative packages that Microsoft made available to restore enrollment functionality.

Enterprise and server guidance​

Organizations should not use the consumer ESU path. Commercial ESU for Windows 10 is purchased through volume licensing and can be renewed for up to three years after end of support, with year‑by‑year pricing increases designed to encourage migration. Enterprises also have additional tools to manage certificate distribution and firmware validation across fleets:
  • Use your OEM or hardware vendor portal to confirm firmware availability and Secure Boot certificate acceptance in UEFI.
  • Consider Azure Arc or Windows Update for Business to simplify deployment of certificates and patches.
  • For virtualized environments, Microsoft lists specific cloud hosts and VM offerings that are entitled to ESU at no extra cost if the VM/host is properly licensed.
If you run servers or specialized gear, expect manual intervention. Some vendors must issue firmware updates to permit new certificates or to update the OEM Secure Boot chains.

Migration alternatives and longer‑term plans​

ESU is explicitly a temporary bridge, not a migration strategy. Consider these options:
  • Upgrade capable systems to Windows 11 if your hardware meets the minimum requirements (TPM 2.0, Secure Boot, supported CPU). Upgrading preserves Microsoft’s full support model and future updates.
  • Replace older hardware that is incompatible with Windows 11 with a new Windows 11 PC. Vendors are offering trade‑in and recycling programs timed with these transitions.
  • Use cloud options: a Windows 11 experience delivered by Windows 365 or Azure Virtual Desktop can be a way to keep modern, supported OS instances without directly replacing endpoint hardware.
  • For certain use cases, evaluate alternate OS choices (Linux distributions) where long‑term support and security patching strategies differ—this is more involved and requires application compatibility planning.
Whatever path you pick, document a migration timeline that finishes before October 13, 2026 for systems relying on the consumer ESU bridge.

Risks, gotchas, and operational realities​

  • Free ESU via OneDrive backup is convenient but not completely free if you need extra storage. OneDrive’s free tier is limited; large backup profiles can force paid storage buys.
  • Microsoft requires a Microsoft Account for ESU enrollment. If you prefer local accounts for privacy or policy reasons, the consumer ESU path is not available without switching to a Microsoft Account.
  • Enrollment rollouts were regionally phased and some users experienced the enrollment wizard failing; Microsoft released out‑of‑band fixes for these issues. If you were affected, apply the November 2025 update that fixes the enrollment wizard (the hotfix targeted consumer enrollment failures).
  • The Secure Boot certificate refresh may still require OEM firmware updates for a subset of machines. If your vendor hasn’t provided firmware updates by June 2026, expect to engage directly with them or plan hardware replacement.
  • Relying on ESU keeps you off the upgrade track. A single year of protection is a short window; the operating system will still be functionally aging and app compatibility or compliance needs may force faster migration.

Practical troubleshooting tips​

  • If you don’t see the ESU enrollment link:
  • Confirm Windows 10 22H2 and that recent cumulative and servicing updates are installed.
  • Run Windows Update repeatedly; Microsoft phased this rollout and some devices saw the enrollment link appear only after a particular out‑of‑band update.
  • Sign in using a Microsoft account that is an administrator on the PC.
  • If the enrollment wizard aborts with an error:
  • Make sure KB updates addressing enrollment bugs have been installed; Microsoft released targeted fixes to restore the wizard.
  • Reboot, then re‑run Settings → Windows Update and retry the wizard.
  • If you suspect a firmware gap:
  • Check your device model and OEM support page for UEFI/BIOS updates referencing Secure Boot or platform security.
  • Contact OEM support if your firmware lacks a path to accept newer Microsoft certificates.

What to do in the next 30/90/180 days (recommended timeline)​

  • Next 30 days:
  • Confirm Windows version (winver).
  • Install all pending Windows updates and the enrollment hotfixes if you plan to rely on ESU.
  • Sign into a Microsoft Account and test the ESU enrollment wizard now while Microsoft is still rolling out fixes and support resources.
  • Next 90 days:
  • For devices you plan to keep, enroll in ESU (choose free OneDrive sync, Rewards points or pay). Save receipts or screenshots for your Microsoft account entitlement records.
  • Inventory machines that cannot upgrade to Windows 11 and tag them for replacement or cloud migration.
  • Next 180 days:
  • If you’re an organization, secure enterprise ESU if required and begin phased hardware refresh or OS migration projects.
  • If you’re a consumer, finalize a plan to upgrade the most critical devices to Windows 11 (or replace them) before October 13, 2026.

Final verdict and recommendations​

Microsoft’s Secure Boot certificate expiration and Windows 10’s end of mainstream support are a coordinated risk event, not two isolated announcements. For many users the path is simple: upgrade to Windows 11 or buy a new machine. For others—people with older but perfectly serviceable PCs, or organizations with complex application stacks—consumer ESU provides a small, responsible safety valve that allows security updates to continue through October 13, 2026.
Practical advice:
  • If you can run Windows 11, upgrade. It restores a fully supported update path and avoids the certificate/ESU complexity.
  • If you can’t upgrade immediately, enroll in ESU now (after verifying prerequisites) to ensure both kernel‑ and boot‑chain protections continue through the bridge period.
  • If you won’t enroll, at minimum make a prioritized migration plan and protect sensitive systems by isolating them, using strong endpoint controls, and avoiding risky exposures (remote access, unnecessary admin privileges, or unvetted drivers).
  • Keep firmware and vendor support channels on your radar—some machines will require OEM action to accept new Secure Boot certificates.
Finally, beware of blanket numbers and fear-based headlines. Estimates of how many Windows 10 machines remain in the wild vary widely between telemetry services and corporate statements; your risk assessment should be based on your actual devices and data. Perform the checks above now, enroll if required, and plan hardware or OS upgrades on a calendar anchored to the June 2026 certificate expiry and the October 13, 2026 ESU cutoff.

Source: CNET Microsoft Issues New Security Warning for Windows 10. Here's What You Need to Do
 

Microsoft’s timeline for the Secure Boot certificate refresh has moved from advance warning to an operational deadline: the long‑running Microsoft Secure Boot trust anchors issued in 2011 begin to expire in mid‑2026, and while Microsoft and OEMs have already built and started shipping a replacement certificate chain (the “2023 CA family”), the transition requires both Windows-side servicing and firmware cooperation. If your PC’s UEFI firmware can’t accept and persist the new certificates, the device will keep booting but may enter a degraded security state where future boot‑level updates — including revocations and bootloader fixes — cannot be installed. This article lays out what’s expiring and when, what Microsoft and OEMs have done, how to verify your own machines, and a practical remediation roadmap for consumers, builders, and enterprise IT teams.

Technician analyzes a circuit-board showing UEFI firmware and security keys PK KEK DB DBX.Background: what Secure Boot stores and why a cert rotation matters​

UEFI Secure Boot enforces a cryptographic chain of trust during the earliest stage of system startup. Firmware keeps a small set of X.509 certificate authorities and hashes in four named variables:
  • PK (Platform Key) — the platform owner/OEM root of authority.
  • KEK (Key Exchange Key) — signs updates to the DB/DBX databases.
  • DB (Allowed Signature Database) — contains trusted CAs and signatures that permit boot binaries to run.
  • DBX (Revoked Signature Database) — lists known‑bad signatures that firmware should block.
Microsoft historically supplied several Microsoft‑issued CAs into these stores beginning in 2011. Those certificates have finite validity periods. When a CA used by firmware expires, the platform can no longer accept updates or trust new binaries signed under the expired authority — which is why Microsoft, OEMs, Linux distributors, and other ecosystem members have coordinated a planned certificate rotation.
Why this matters in practice: if a device still relies on the 2011 CAs after they expire, it will typically continue to boot but will lose the ability to receive Secure Boot‑related updates delivered via Windows Update or OEM firmware channels. Over time that prevents Microsoft from distributing bootloader fixes and revocations (DBX), and it raises the risk surface for boot‑level attack techniques such as bootkits.

The expiry window: what’s going away and the new replacements​

Microsoft’s 2011 CAs are being replaced by a family of 2023 CAs. The practical expiry window is mid‑2026 for most of the 2011 CAs, with one PCA (the signing authority used for the Windows Boot Manager) expiring later in 2026.
Key items and the operational impact:
  • Microsoft Corporation KEK CA 2011 — expires in late June 2026. This KEK enables updates to DB and DBX. Replacement: Microsoft Corporation KEK 2K CA 2023.
  • Microsoft Corporation UEFI CA 2011 — expires in late June 2026. Replacement: split into Microsoft UEFI CA 2023 and Microsoft Option ROM UEFI CA 2023 (the split separates bootloader signing from option ROM signing).
  • Microsoft Windows Production PCA 2011 — expires in October 2026. Replacement: Windows UEFI CA 2023 (used to sign the Windows Boot Manager).
OEM published timelines sometimes list day‑level dates that differ by a day or two depending on time zones and internal calendars (for example, some vendors show June 24/25/27/28 and October 19/20). Treat the month‑level windows (June 2026 and October 2026) as the operational deadlines, and consult your device vendor for the model‑specific guidance and the minimum firmware version required.

Microsoft’s role: OS‑side delivery and the gating logic​

Microsoft has implemented the OS‑side tooling and staged Windows updates to deliver the 2023 certificates and to install a Windows Boot Manager signed under the Windows UEFI CA 2023. That work includes:
  • An update (documented as KB5036210) that adds the ability to apply the Windows UEFI CA 2023 certificate into the firmware DB on systems where firmware permits OS-initiated UEFI variable writes.
  • A staged, telemetry‑gated rollout that only enrolls devices that demonstrate firmware readiness. Microsoft deliberately phases the push to minimize the risk of widespread outages.
  • A scheduled servicing task that will process Windows‑side flags and apply certificate updates where vetted and allowed.
Important operational notes:
  • The DB update and Boot Manager swap are separated into phases to avoid leaving a device with an untrusted Boot Manager mid‑transition.
  • Microsoft can only perform the in‑firmware component of the roll‑over if the device firmware accepts those writes and will retain the new entries across reboots and resets.
  • Some systems — particularly older hardware, air‑gapped machines, or devices with firmware protections that disallow OS writes to KEK/DB — will need an OEM firmware update or manual intervention.

OEM responsibilities and common pitfalls​

The firmware (BIOS/UEFI) vendor ultimately decides whether a device can accept and hold the new certificates. OEMs have followed broadly similar approaches, but the details matter:
  • Dual‑certificate strategy: Many OEMs began shipping both the 2011 and 2023 certificates on new platforms in 2024 and backfilled older sustaining platforms during 2025. Machines that already shipped with the 2023 certs are the least likely to need user intervention.
  • Active vs Default databases: Firmware typically stores a default key set (dbDefault/KEKDefault) that is copied into the active variables (db/KEK) during factory provisioning or when certain BIOS actions occur. If the firmware’s default set wasn’t updated to include 2023 certs, a factory‑reset or BIOS action that repopulates active variables from defaults can revert the system back to 2011 only, wiping the 2023 entries the OS may have applied.
  • Expert or key‑management BIOS actions: Some vendor BIOS menus include options like “Expert Key Management” or “Install/Restore factory keys.” On certain models, selecting those without the updated defaults can remove OS‑applied keys and restore older 2011 entries — potentially triggering BitLocker recovery prompts and losing the ability to accept future Secure Boot updates.
  • BitLocker and TPM interactions: Firmware changes or toggling Secure Boot mode can trigger BitLocker recovery. Back up the BitLocker recovery key before performing firmware or Secure Boot changes.
Vendor examples (how they are handling the transition):
  • Dell published a per‑model transition FAQ and a list of supported platforms and minimum BIOS versions. Dell warns about the Active vs Default key distinction and documents the potential for Expert Key Mode to cause key rollbacks.
  • Lenovo published detailed procedural guidance for servers and commercial PCs, including PowerShell checks and WinPE‑based verification workflows for the Windows Boot Manager and bootable media.
  • ASUS provided a consumer‑facing, step‑by‑step FAQ that explains how to check KEK and DB entries in UEFI and how to Install Default Secure Boot Keys / Restore Factory Keys after a BIOS update.
  • HP posted model lists and BIOS minimum versions and recommends applying BIOS/firmware updates so the default DB contains the 2023 certs. HP also flags that some platforms exposed a BIOS setting to “Enable MS UEFI CA Key” which controls whether third‑party UEFI code is permitted.
Across the board, OEM guidance reinforces a single, important rule: apply firmware/BIOS updates when recommended before forcing or accelerating Windows‑side certificate deployment.

How to check if your PC is ready (checks for home users and admins)​

You can verify presence and deployment status with a combination of firmware inspection, PowerShell checks, event logs, and registry indicators.
Important safety first: before doing firmware actions or registry changes, back up your BitLocker recovery key, create recovery media, and ensure you have physical console access. Firmware resets or key changes can trigger BitLocker and require the recovery key to regain access.

Quick visual check (firmware UEFI menu)​

  • Reboot to UEFI/BIOS setup (commonly F2, Del, F10 depending on vendor).
  • Locate Secure Boot → Key Management (or similar).
  • View KEK entries — confirm presence of Microsoft Corporation KEK 2K CA 2023.
  • View db (Authorized Signatures) entries — confirm presence of Windows UEFI CA 2023 and, where applicable, Microsoft UEFI CA 2023 and Microsoft Option ROM UEFI CA 2023.
If you see those strings listed and the key source is Default or Firmware, the firmware already includes the 2023 certs.

PowerShell checks (Windows, run as Administrator)​

  • Test for the Windows UEFI 2023 CA in the DB:
  • [System.Text.Encoding]::ASCII.GetString((Get‑SecureBootUEFI db).Bytes) -match 'Windows UEFI CA 2023'
  • If this returns True, the DB contains the Windows UEFI CA 2023 entry.
  • List recent Secure Boot update events (Event IDs 1801/1808):
  • Use Get‑WinEvent with a filter for System log IDs 1801 and 1808.
  • Event ID 1808 = informational; indicates device has updated Secure Boot CA/keys and Boot Manager was replaced successfully.
  • Event ID 1801 = error; indicates the device failed to apply the updated certificates and will include device attributes for triage.
  • Check registry status keys (Windows service flags):
  • HKLM\SYSTEM\CurrentControlSet\Control\SecureBoot\Servicing\UEFICA2023Status
  • Desired final value: Updated
  • HKLM\SYSTEM\CurrentControlSet\Control\SecureBoot\Servicing\UEFICA2023Error
  • Should not exist unless an error is pending.
  • HKLM\SYSTEM\CurrentControlSet\Control\SecureBoot\AvailableUpdates
  • This is a bitmask that Windows and admins can set to trigger specific phases of the update cycle. Microsoft’s published guidance recommends careful, staged deployment rather than heavy‑handed manual flagging; KB5036210 documents the controlled way to stage DB updates.

Basic cloud/enterprise telemetry checks​

  • If you use Intune, Autopatch, or other management tooling, Microsoft’s playbook includes reporting columns and secure‑boot status reports that surface devices that are “not up to date.” Use those management dashboards and capture Event ID 1801 occurrences for triage.

How to trigger the update (enterprise and careful power users)​

Microsoft and OEMs designed the path to be mostly automated — if Windows Update and a compatible firmware are present, most consumer and business devices should receive the updates without manual intervention. However, for IT teams or advanced users who must accelerate adoption:
  • Apply vendor firmware updates first, if the OEM recommends one for your model. This reduces the chance of a failed firmware write and avoids the Active/Default key mismatch trap.
  • For the DB update stage (KB5036210 guidance): set AvailableUpdates to the appropriate flag (Microsoft documented using 0x40 as the DB update bit) using deployment tooling (Group Policy, MDM) — this phases the rollout safely.
  • Start the scheduled task that processes updates:
  • Start‑ScheduledTask -TaskName "\Microsoft\Windows\PI\Secure‑Boot‑Update"
  • Reboot the device — sometimes two reboots are necessary to complete staged updates.
  • Validate by checking for Event ID 1808 and confirming the UEFICA2023Status registry value reads Updated and that the Get‑SecureBootUEFI db check returns True for the 2023 entries.
Cautions and caveats:
  • The AvailableUpdates bitmask includes many flags; setting the wrong combination can attempt more invasive changes (such as revocations or Boot Manager swaps) before firmware is ready. Microsoft and OEMs strongly recommend staged testing on representative hardware before broad deployment.
  • Some community scripts use values like 0x5944 to force “all flags” — do not copy such approaches wholesale in production; those flags can break systems that are not fully validated. Use OEM guidance and Microsoft KB instructions.
  • If you see Event ID 1801 after attempting an update, collect details (manufacturer, firmware version, BIOS family ID) and check with the OEM for a vendor remediation or BIOS release.

Special cases: DIY builds, gaming motherboards, Linux, and virtualization​

  • DIY motherboards and gaming boards may expose direct key management UI options and require manual “Install Default Secure Boot Keys” or “Restore Factory Keys” after a BIOS update. ASUS, for example, published step‑by‑step guidance showing the exact UI flows and the string names to look for.
  • Linux distributions and shims: Linux vendors (for example, Red Hat) are coordinating new shim binaries signed under the 2023 CA set. If your machine cannot be updated to include the 2023 certs, future shim updates may fail to boot after the signing shift is completed by vendor ecosystems.
  • Virtual machines: some Hyper‑V guests and QEMU setups encountered KEK update failure modes in labs; Microsoft is tracking Hyper‑V VM edge cases and has planned fixes where firmware emulation blocks KEK writes. If you run important VM workloads, validate guest behavior in lab images and ensure hypervisor tooling is updated.

The Windows 10 wrinkle: unsupported OS and Extended Security Updates (ESU)​

Microsoft ended mainstream Windows 10 support on October 14, 2025. Microsoft positions Extended Security Updates (ESU) as the paid path to receive security updates after that date; consumer ESU enrollment extends until October 13, 2026 in the consumer ESU program. The practical impact for the Secure Boot refresh:
  • Windows 10 machines on no‑longer‑supported builds will not receive the KB‑level servicing push for the 2023 CA unless they are enrolled and eligible for ESU (or the machine is on LTSC/ESU‑eligible channels).
  • Enterprises still running Windows 10 must confirm device OS eligibility before relying on Windows Update to apply the Secure Boot DB updates. If not eligible, they will either need manual OEM firmware interventions or a migration to a supported OS path to preserve updateability.

A pragmatic checklist: what to do now (consumer and IT playbook)​

Follow these prioritized steps to minimize risk between now and the expiry window:
  • Inventory and triage
  • Identify fleet models, BIOS family IDs, and current firmware versions.
  • Flag air‑gapped, offline, or firmware‑locked devices for manual remediation.
  • Update firmware
  • Apply OEM BIOS/UEFI updates that explicitly state 2023 CA support or minimum BIOS versions for the Secure Boot transition.
  • Backup keys and recovery material
  • Ensure BitLocker recovery keys are stored off‑device and recovery media is created.
  • Validate on representative devices
  • Run the PowerShell checks and capture Event IDs 1801/1808 on proof‑of‑concept systems. Confirm registry UEFICA2023Status reports Updated after a successful run.
  • Staged rollout
  • For enterprises, follow Microsoft’s guidance: start with small device groups, observe telemetry and event logs, then expand rollout when confidence is High.
  • Document recovery plan
  • Have BIOS recovery images, OEM bootable media, and vendor contact paths ready if a device cannot accept OS‑side writes or fails during the handover.
  • Communicate to end users
  • Warn users that firmware resets and BIOS changes can trigger BitLocker; require them to have their recovery key before maintenance windows.

Strengths, risks, and final analysis​

Strengths
  • The ecosystem approach — Microsoft plus OEM coordination — is the right architectural response: Microsoft supplies the OS servicing and signatures, OEMs assure firmware persistence, and Linux and third‑party vendors sign new shims and drivers under the 2023 CA family.
  • The phased, telemetry‑gated rollout reduces the risk of mass failures by targeting only devices that demonstrate readiness.
  • Firmware updates and procedural guidance from major OEMs are available, and many new devices already shipped with 2023 certificates by default.
Risks and blind spots
  • Devices with firmware that blocks OS‑initiated writes, or those whose default firmware store lacks 2023 certs, are at risk of losing updateability. Factory resets or BIOS actions can inadvertently roll these devices back to 2011 only if defaults weren't updated.
  • DIY and custom‑built systems are the most likely to need manual user intervention and carry the greatest risk of accidental Secure Boot breakage.
  • Windows 10 holdouts that are not enrolled in ESU will be unable to receive the OS‑side update that helps some devices transition, raising the bar for manual OEM remediation.
  • Aggressive community scripts and undocumented bitmask settings circulated online can succeed in labs but carry the real potential for bricking or requiring complex recovery on diverse firmware families.
Verdict
  • If you keep your system updated (Windows Update + Vendor BIOS updates) and you run a supported Windows release, your risk is low — vendors and Microsoft have already done the heavy lifting for the majority of modern devices. If you manage fleets, air‑gapped servers, custom gaming rigs, or older end‑of‑service hardware, treat this as a high‑priority remediation item with a short deadline: test early, apply firmware updates first, and use Microsoft's event and registry signals (Event ID 1808, UEFICA2023Status = Updated) as the definitive indicators of success.

Conclusion: timeline and last words​

The Secure Boot certificate rotation is not a speculative future problem — it’s an operational deadline. The critical date window begins in June 2026 (with related expirations stretching into October 2026), and Microsoft’s KB and OEM advisories are explicit: systems that don’t adopt the 2023 CA family risk being unable to accept future Secure Boot and Windows Boot Manager updates. For most modern, regularly patched machines the migration will be invisible. For older, firmware‑restricted, or DIY machines it may require manual BIOS updates, key reinstalls, or OEM assistance.
What to do this week:
  • Confirm your model’s BIOS minimum version for the transition and apply OEM firmware if recommended.
  • Back up BitLocker recovery keys and create recovery media before making changes.
  • Run the short PowerShell checks above and look for Event ID 1808 or the UEFICA2023Status = Updated marker.
  • For managed fleets, run a representative pilot, watch Event ID 1801 for failures, and escalate to the OEM if errors appear.
Treat this as predictable maintenance, not panic. With firmware and OS cooperation, the rotation preserves Secure Boot’s protections for years to come — but the handoff only works where the firmware keeps the new trust anchors. Do the checks now, and you’ll avoid an unpleasant scramble later when the calendar forces the issue.

Source: Notebookcheck Windows Secure Boot 2026: Microsoft issues final warning over expiring certificates
 

Glowing Windows security shield with KEK and DB icons on a circuit board.
Microsoft’s blunt deadline for Windows 10 users — upgrade before June or accept a “degraded security state” — is not hype: it reflects a real, measurable change in how the Windows boot chain will be trusted going forward, and it forces consumers and IT teams to choose between upgrading, enrolling in a time‑limited Extended Security Updates (ESU) program, or accepting increasing exposure to boot‑level threats.

Background / Overview​

Secure Boot was introduced as part of the UEFI standard to stop tampered or unauthorized code from running before the operating system starts. It relies on cryptographic certificates and key databases (KEK, DB, DBX) stored in firmware to verify boot managers, Option ROMs, and other early‑startup components. Microsoft and OEMs used a set of certificates originally issued in 2011 (often referred to in coverage as the “2011 CA” keys) to establish that trust. Those certificates are now being replaced with a newer 2023 generation, and the change has firm calendar consequences: the 2011 certificates begin expiring in June 2026.
Microsoft calls the move a “generational refresh”: updated certificate authorities (CA 2023) are being issued and distributed so that future boot‑time protections, revocations, and patches can be cryptographically trusted. For devices that receive and accept the new certificates, the transition is largely automatic through Windows Update; for devices that do not, Microsoft warns that while normal startup and most Windows features will continue to work, those machines will no longer be eligible to receive new protections for the early boot process. In plain terms: the OS will keep running, but the firmware‑level trust anchors that protect the boot process will be frozen in time.

What exactly is expiring — and why it matters​

The technical picture: KEK, DB and DBX​

Secure Boot uses several key stores:
  • KEK (Key Enrollment Key): authorizes updates to the DB/DBX.
  • DB (Allowed Signatures Database): contains certificates and hashes the firmware will accept.
  • DBX (Revoked Signatures Database): lists signatures that must be rejected.
The certificates Microsoft used to sign updates and components (the original Microsoft UEFI CA entries) are reaching their cryptographic end of life. When a CA entry expires, it can no longer be used to sign new boot components or revocations. That prevents Microsoft and partners from issuing updated, signed fixes to the boot chain — the exact place hostile code could attach itself to compromise BitLocker, boot manager integrity, or other pre‑OS protections.

What “degraded security state” means in practice​

When Microsoft warns a system will enter a “degraded security state,” it is not saying the machine will suddenly stop booting. Instead, the consequences are specific and technical:
  • New boot‑time vulnerability fixes cannot be applied because the signature mechanism for those fixes relies on the refreshed certificates.
  • Microsoft cannot add entries to the DBX (revocations) if the signing certificate is expired, which prevents remote disabling of known‑bad boot loaders.
  • Security features that rely on up‑to‑date firmware trust (for example, some enhanced BitLocker hardening and vendor-specific secure components) lose the ability to evolve and receive future protections.
Put bluntly: the surface area for successful boot‑level attacks grows over time if the certificate refresh is not applied.

Timeline and who’s affected​

Key dates you must know​

  • June 2026: Original Microsoft Secure Boot certificates (2011 CA) begin expiring; Microsoft’s guidance says update the certificates well before this date.
  • January 13, 2026: Microsoft shipped KB5074109, which added targeting and telemetry improvements to quality updates and began the phased rollout of the certificate refresh process. This update contains logic to identify devices eligible for automatic certificate injection.
  • October 14, 2025: Mainline support for Windows 10 ended; Microsoft requires special enrollment to continue receiving critical updates.
  • October 13, 2026: The Windows 10 Extended Security Updates (ESU) consumer program ends — a hard stop for ESU‑based protection continuity.
These dates form the practical timetable: the certificate expiration starts in June 2026, while Windows 10 devices without ESU or without the certificate refresh in firmware may lose the ability to receive future boot‑level fixes.

Who will be updated automatically​

Microsoft’s public guidance is explicit: most consumer Windows devices that receive Microsoft‑managed updates should be updated automatically to include the new CA 2023 certificates. Devices sold since 2024 commonly already ship with the refreshed certificates in firmware. Windows 11 machines are receiving updates as part of normal servicing, and many Windows 11 systems sold in 2024–2025 came with the new certificates preinstalled by OEMs.

Who will not be updated automatically​

  • Older devices with firmware that cannot accept new keys — some legacy firmware implementations cannot inject new KEK/DB entries.
  • Systems with Secure Boot disabled — the update path assumes Secure Boot is enabled; disabled Secure Boot means the system cannot receive the injected trust anchors.
  • Closed networks using WSUS or other management tools where updates are held back — admins must approve the specific KBs and ensure the rollout is applied.
  • Windows 10 installations that are not enrolled in ESU or otherwise eligible — Microsoft’s automated injection is primarily targeted to supported OS versions and modern update paths; legacy Windows 10 without ESU may be excluded from some automatic assistance.

The choices: upgrade, enroll, or accept risk​

At the consumer and small business levels, the options reduce to three main paths. Each has tradeoffs.

1. Upgrade to Windows 11 (recommended for most users)​

  • Pros:
    • Full access to the certificate refresh via normal Windows Update on supported hardware.
    • Continued feature and security updates beyond Windows 10 EOL.
    • OEM‑shipped Windows 11 devices sold since 2024 usually already contain the new CA 2023 entries.
  • Cons:
    • Hardware requirements for Windows 11 can exclude older machines (TPM 2.0, Secure Boot, CPU compatibility).
    • Unsupported or “bypassed” upgrades (using unofficial workarounds) may work but can compromise automatic update behavior and are not recommended for security‑conscious users.

2. Enroll in Windows 10 Extended Security Updates (ESU)​

  • Pros:
    • ESU provides critical and important security updates for Windows 10 through October 13, 2026, buying time to migrate. Enrollment options include free enrollment if sync settings are enabled, redeeming Rewards points, or a one‑time purchase.
  • Cons:
    • ESU is explicitly temporary and does not restore mainstream support or feature updates.
    • There are enrollment prerequisites (Windows 10 version 22H2 and specific account requirements) and operational limits. ESU does not include new features or generalized technical support.
    • Even with ESU, Microsoft’s ability to inject new Secure Boot certificates into firmware may depend on OEM firmware support or manual OEM updates.

3. Remain on Windows 10 without ESU​

  • Pros:
    • No immediate financial or upgrade burden.
  • Cons:
    • Devices will not receive new boot‑level protections after the certificate expiry window; risk of boot‑level exploits increases over time.
    • Many security mitigations for the early boot environment will not be available, and important components like DBX revocations cannot be applied. This path is strongly discouraged for users who value data confidentiality and device integrity.

What enterprises and IT teams should do now​

Enterprises have a narrow window to act. Microsoft’s rollout is phased and cautious, but corporate fleets — particularly those using WSUS, SCCM, or air‑gapped systems — must plan deliberate remediation.

Immediate checklist (recommended order)​

  1. Inventory: Identify all machines running Windows 10 and which ones are at or past version 22H2. Record firmware versions and whether Secure Boot is enabled.
  2. Confirm update path: Ensure devices are receiving Microsoft‑managed cumulative updates or, for closed networks, that KB5074109 (and related updates) are approved and deployed in WSUS/SCCM. KB5074109 includes the initial high‑confidence targeting necessary for automatic injection.
  3. Verify Secure Boot keys: Use PowerShell on representative systems: run Get‑SecureBootUEFI and inspect the UEFI Secure Boot db for the presence of the Microsoft UEFI CA 2023 entries. If keys are absent, plan for manual import or OEM firmware updates.
  4. Engage OEMs: For devices that lack firmware support for injecting the CA 2023 entries, contact device OEMs to obtain firmware updates or guidance. Some older models will not receive firmware updates and may need hardware replacement.
  5. Plan migrations: Where upgrade to Windows 11 is the chosen path, test the upgrade process on pilot machines, validate driver compatibility and app behavior, and schedule bulk rollouts before the June window. For machines that cannot be upgraded, consider ESU enrollment as a stopgap.

Technical steps administrators should test now​

  • Run: Get‑SecureBootUEFI (PowerShell) — inspect KEK and DB entries for the new Microsoft CA 2023 identifier. If missing, check whether the device has received the relevant cumulative update and whether firmware allows key injection.
  • For WSUS: Approve the relevant cumulative updates (starting with the January 13, 2026 packages and onward) so devices can receive the high‑confidence targeting data used by Microsoft to identify eligible systems.
  • If key injection fails: evaluate manual import of Microsoft’s published packages or OEM tools; document any exceptions and risk‑accept them explicitly.

Real‑world impacts and notable edge cases​

Anti‑cheat and gaming ecosystems​

Anti‑cheat modules from vendors such as EA, Riot, Activision, and Epic have leaned on Secure Boot as part of their integrity model. If Secure Boot certificates are expired or unsigned components can no longer be reliably revoked, these anti‑cheat mechanisms might behave unpredictably — either refusing to start or losing a layer of tamper resistance. Microsoft and anti‑cheat providers have been coordinating to ensure gaming‑focused systems receive the new certificates ahead of the June window.

Older IoT, embedded, and medical devices​

Systems with specialized firmware — industrial controllers, medical devices, and some embedded platforms — are at acute risk because firmware vendors often have long‑past support windows and limited update channels. For devices that cannot receive firmware updates, the only real mitigation may be network isolation, compensating controls, or hardware replacement. Microsoft explicitly notes that firmware compatibility is a gating factor for injection; customers must work with OEMs.

Unsupported Windows 11 installs and “workarounds”​

There is a persistent ecosystem of guides that let users install Windows 11 on older hardware by bypassing TPM or CPU checks. Two important cautions:
  • Installing Windows 11 via unofficial bypasses often creates update and telemetry gaps. Microsoft’s automatic injection and phased rollout depend on update telemetry signals; bypassed systems could be deprioritized or excluded.
  • Even if an unsupported Windows 11 install appears to work, firmware limitations (not OS) remain the primary barrier to receiving refreshed Secure Boot CA entries. Unsupported installs are not a reliable long‑term security strategy.

Critical assessment: Microsoft’s approach — strengths and risks​

Strengths​

  • Proactive, phased rollout: Microsoft’s use of high‑confidence targeting and phased injection reduces the risk of wide‑scale update failures that could brick machines or produce boot instability. KB5074109’s targeting logic is an example of this responsible rollout behavior.
  • Early inclusion in modern hardware: OEMs have shipped many devices since 2024 with the 2023 certificates preinstalled, limiting the population that needs intervention. This reduces the total number of at‑risk units.
  • Clear, public documentation: Microsoft published explicit guidance about what works, what stops working, and how organizations can verify their state — essential for IT triage.

Risks and shortcomings​

  • Dependency on OEM firmware: The biggest practical failure mode is firmware that cannot accept the new keys. When firmware vendors have stopped updating old models, consumers face hardware replacement pressure — a problem Microsoft cannot fully solve.
  • Windows 10 exclusion friction: While Microsoft offers ESU as a stopgap, the overall message that Windows 10 users must either upgrade or enroll in a paid/time‑limited ESU program feels punitive to some households and small businesses. The ESU route also introduces Microsoft account and activation requirements that some users will find intrusive.
  • Complexity for managed environments: WSUS, SCCM, and controlled update environments require careful planning and manual approvals. The phased nature of Microsoft’s rollout combined with organizational change controls increases the likelihood of missed devices.
  • Communication and timing risk: The June window is near enough that late movers will have compressed time to test firmware updates and escalate to hardware replacements if required.

Practical recommendations for day‑to‑day users​

  • Ensure your PC is running a supported OS and is set to receive Windows Update automatically. For consumer Windows 10 users, enroll in ESU only if you cannot upgrade immediately; understand that ESU is temporary and ends on October 13, 2026.
  • Keep Secure Boot enabled — do not disable Secure Boot to “work around” certificate issues; Microsoft explicitly warns that disabling Secure Boot significantly reduces protection and is not a safe mitigation.
  • Install the latest cumulative updates (including KB5074109 and later) and restart so that the update process has a chance to apply the high‑confidence targeting and certificate injection.
  • For users comfortable with PowerShell, run Get‑SecureBootUEFI to verify whether your firmware’s DB contains Microsoft UEFI CA 2023 entries. If not present and you are on a supported OS receiving updates, contact your OEM.

How to verify your machine’s Secure Boot certificate status (step‑by‑step)​

  1. Open PowerShell as Administrator.
  2. Run: Get‑SecureBootUEFI
    • Inspect the output for Microsoft UEFI CA entries and any timestamps or version identifiers that indicate the presence of the 2023 CA certificates.
  3. If the 2023 CA entries are absent:
    • Confirm you have installed the January 2026 cumulative updates (or later) that include the new targeting logic.
    • Reboot and check again.
    • If still absent, check for OEM firmware updates and apply them if available. If the device is managed, ensure WSUS/SCCM approvals are in place.
  4. If you cannot obtain firmware updates and the device cannot be upgraded, plan for migration or hardware replacement — do not rely on indefinite operation without boot‑chain protections.

Final analysis and what this means for the average PC owner​

Microsoft’s Secure Boot certificate refresh is technically precise and operationally necessary: cryptographic trust anchors expire, and new certificates must be issued and accepted to keep the boot chain resilient to evolving threats. The company has built safeguards into the rollout to minimize damage — phased updates, high‑confidence targeting, and broad documentation. For many users on modern devices and on Windows 11, the transition should be transparent.
But the event exposes systemic fragility. Firmware diversity, long‑expired OEM update policies, and the sheer scale of Windows 10 installations left behind by EOL create a brittle landscape in which some users have no realistic path other than hardware replacement. Microsoft’s ESU provides a pause, not a solution; it trades time for security complacency while pushing the cost back onto users who delay migration.
If you care about the integrity of your device from the instant it powers on, treat this as urgent. Verify your Secure Boot certificate status today, install the required updates, and either plan an upgrade to Windows 11 (on supported hardware) or enroll in ESU only as a controlled interim measure. Waiting until June folds risk into your device that cannot easily be unwound later.

Conclusion — a practical, non‑alarmist call to action​

Boot‑level protections are foundational: they are the first line of defense before antivirus, firewall, or application controls engage. Microsoft’s deadline is not a marketing ploy — it is the calendar reality of certificate lifetimes. For most users, the path is straightforward: install updates, verify Secure Boot is enabled, and upgrade to Windows 11 if your hardware supports it. For those who cannot upgrade, enroll in ESU as an explicit, time‑boxed contingency and engage your OEM for firmware options. For IT pros, the work is triage, verification, and clear migration timelines.
Do not treat “degraded security state” as theoretical. If you are responsible for sensitive data, corporate access, or the integrity of critical systems, the steps described here must be on your short‑term roadmap — verified, tested, and completed well before the June certificate expiry window.

Source: Trusted Reviews Windows 10 users need to upgrade to Windows 11 before June
 

Microsoft’s latest Secure Boot certificate refresh has turned an already uncomfortable moment for Windows 10 holdouts into a ticking clock: machines that didn’t move to a supported Windows release by October 14, 2025 now face not only the end of monthly security fixes but also the prospect of being excluded from a coordinated, platform-level security update that will begin to matter this June. The upshot is blunt and immediate — if your PC is still on unsupported Windows 10 and is not enrolled in Extended Security Updates (ESU), it may be locked out of the new Secure Boot trust anchors that Microsoft and OEMs are rolling out to avoid a mass expiry next year.

Glowing Secure Boot symbol on a motherboard, June 2026.Background / Overview​

Microsoft introduced Secure Boot with the UEFI standard to stop unsigned or tampered code from loading during the earliest startup phases. The certificates and trust chain Microsoft used to sign Windows boot components and manage UEFI trust (the KEK/DB/DBX model) were first issued around 2011. Cryptography and certificate lifecycles are finite; after roughly 15 years, those 2011 certificates approach their planned end-of-life.
To prevent a systemic risk where millions of devices suddenly cannot receive new boot protections or revocations, Microsoft issued a coordinated plan: new certificates were created (the 2023 CA family), OEMs were asked to ship newer machines with those certificates already embedded in firmware, and Microsoft is delivering the updated trust anchors to many existing PCs via regular Windows updates. The company has started that rollout and has made clear that the original 2011 certificates will begin expiring in mid‑2026. For devices that do not receive the new certificates, Microsoft warns of a “degraded security state” — a condition that does not cause an immediate failure to boot, but does reduce the device’s ability to receive future boot-level protections and mitigations.
This matters acutely for Windows 10 holdouts because Microsoft stopped providing free security updates and mainstream support on October 14, 2025. Microsoft’s approach is explicit: devices running unsupported Windows 10 (unless enrolled in ESU) are not in scope for the platform update path that will push the new Secure Boot certificates. That leaves two primary choices for individuals and organizations: upgrade to a supported Windows release (Windows 11 where hardware allows), or enroll eligible Windows 10 devices in the Extended Security Updates (ESU) program to remain in the update pipeline through October 13, 2026.

Why Secure Boot certificates matter — a technical primer​

What Secure Boot protects and why certificates expire​

Secure Boot enforces a signature check during the pre-OS boot sequence. Firmware (UEFI) consults a set of trust anchors to decide whether that next-stage component — a bootloader, option ROM, or kernel driver — is acceptable. Those trust anchors are governed by cryptographic certificates. Over time, cryptographic algorithms and key lengths age — certificates can become weak, keys can leak, and revocations or mitigation procedures need a trusted channel to be enforced. Certificate rotation is a standard security maintenance step, not an emergency fix.
When a certificate that signs boot components expires, firmware and the operating system lose the current cryptographic anchor used to sign future updates to the Secure Boot databases (the DB and DBX). Without fresh trust anchors you can no longer receive updates to the list of allowed or disallowed boot components. Over time that prevents new mitigations and revocations from being delivered, and increases the attack surface for boot-time malware and rootkits.

The components — KEK, DB, DBX explained simply​

  • KEK (Key Exchange Key) — authorizes who can update the DB/DBX; it’s the “canary” that validates changes to the trust database.
  • DB (Allowed Signers Database) — lists certificates and hashes that are permitted to run at boot.
  • DBX (Revocations / Disallowed Database) — lists known-bad boot items that should be blocked.
Microsoft’s certificate refresh replaces the old KEK and DB certificates (the 2011 CA family) with newer 2023 CA keys and splits some functions to allow finer-grained control (for example, separating option ROM signing from third‑party boot loader signing). That split matters to organizations that, for compatibility reasons, need to trust one category but not another.

The timeline you need to know — exact dates and what they mean​

  • October 14, 2025 — Windows 10 support ended. After this date Microsoft stopped providing free monthly security updates and mainstream support for Windows 10 Home, Pro, Enterprise and Education editions unless devices are enrolled in the ESU program.
  • June 2026 — Some Secure Boot certificates begin expiring. The original 2011 KEK and many related certs start to reach the end of their intended lifecycle.
  • October 2026 — Additional 2011 certificates (Windows Production PCA family) reach expiry. The certificate expiration window spans mid‑2026 into late 2026 depending on certificate role.
  • October 13, 2026 — End of consumer ESU coverage window for Windows 10 devices enrolled in the Extended Security Updates program.
If you are reading this, treat the June 2026 milestone as the immediate deadline for ensuring your hardware will be enrolled in the new trust anchors. The worst outcomes only emerge over months, not instantly, but the safe course is to act early.

Who is affected — and who likely already has nothing to worry about​

  • Devices sold since roughly 2024: Many newer PCs already shipped with 2023 certificates embedded in firmware. If your PC was purchased in 2024 or later, you are likely already covered and require no action beyond regular Windows updates.
  • Windows 11 devices on current builds: Most will receive the certificate refresh automatically through Windows Update and are in the primary rollout channel.
  • Windows 10 devices that enrolled in ESU: Eligible Windows 10 devices that enrolled in ESU remain in the servicing pipeline and can receive the certificate updates.
  • Unsupported Windows 10 devices (no ESU) and older systems: These are at risk of being excluded from Microsoft’s update path for the new certificates and could enter the degraded security state once the 2011 certs expire.
  • Specialized and air-gapped systems (servers, IoT, industrial machines, virtual firmware images): These often fall outside the standard update channels and will need targeted firmware updates from OEMs or bespoke remediation.

The “degraded security state” — what actually happens to a PC left behind​

  • You will still boot. There is no immediate mass-bricking scenario tied to the certificate expiry. Existing software keeps running.
  • You will stop receiving new boot-level mitigations or revocations. Over time, this means new protections for bootloader vulnerabilities and updated disallowed lists won’t be applied.
  • Some software or drivers that depend on updated Secure Boot expectations may fail to load in the future. That includes some anti-cheat drivers and new platform security features that assume the presence of the 2023 CA.
  • Compatibility problems will increase. New OS releases, future firmware, or security products may assume updated trust anchors; older certs may mean the system cannot be treated as fully trusted by modern software.
This is a progressive erosion of security and compatibility — it’s not a single catastrophic event — but the cumulative effect can be severe for systems that remain unpatched in this critical layer.

Microsoft’s official update path — what they are doing and who receives what​

Microsoft issued new 2023 certificate authorities and began delivering them via Windows Update in a staged rollout. The company employed two practical tactics:
  • Ship new certificates in firmware for new devices (OEMs started shipping those in many 2024 models).
  • Deliver enrollment updates via Windows Update to eligible devices that demonstrate “healthy update signals” to minimize risk and ensure a safe phased rollout. That means Microsoft’s rollout is targeted — devices must be on supported Windows releases and on normal update paths to receive the injection.
Crucially, Microsoft’s own guidance is explicit: devices running unsupported versions of Windows (i.e., Windows 10 after October 14, 2025), unless enrolled in ESU, are not part of the automatic delivery scope and therefore won’t receive the certificate updates from Microsoft’s standard Windows Update path.

The Extended Security Updates (ESU) wrinkle — what you can do if you’re still on Windows 10​

Microsoft offered a short, practical lifeline for Windows 10 users who could not or would not migrate immediately:
  • ESU extends security servicing for eligible Windows 10 devices through October 13, 2026.
  • Enrollment options included low-barrier consumer paths: at‑no‑additional‑cost enrollment if you have PC settings sync enabled, redeeming Microsoft Rewards points (1,000 points), or a one‑time purchase option for those who prefer to pay.
  • ESU keeps devices visible to Microsoft update channels and (critically here) maintains eligibility for platform-level updates like the Secure Boot certificate injection.
If your device is eligible and you prefer to stay on Windows 10 through the ESU window, enroll now — don’t wait until certificates start to expire. Enrollment after expiry can be too late for automatic remediation.
Note: Some coverage options and enrollment mechanics vary by region and enterprise agreements. Also, ESU is explicitly temporary support; it postpones the problem rather than eliminates it. Plan migration or hardware refresh accordingly.

Practical checklist for consumers — what to do today​

  • Confirm your Windows version and support status.
  • Open Settings → System → About, or run Win + R → type winver to see your OS build and edition. If your Windows 10 device is still on any retail Home/Pro/Enterprise build and you did not enroll in ESU before October 14, 2025, treat it as unsupported.
  • Check Secure Boot state.
  • Press Win + R, type msinfo32, and look at “Secure Boot State” in System Summary. If it reads “On” and your PC is relatively new, you may already be OK.
  • Confirm Windows Update health.
  • Ensure Windows Update is enabled, updates are being applied automatically, and that your device is allowed to report update telemetry (some staged rollouts require healthy update signals).
  • Enroll in ESU if you must remain on Windows 10.
  • If eligible, enroll now via the Microsoft account method described in Microsoft’s ESU guidance. If you previously synced PC Settings with a Microsoft account, check whether you were already granted ESU at no additional cost.
  • Check OEM firmware support.
  • Look up your device model on the manufacturer’s support page and confirm whether a firmware/BIOS update bundles the 2023 certificates or if a vendor-specific process is required.
  • Back up recovery keys and media.
  • Export BitLocker recovery keys, create system recovery media, and ensure you have current backups before any firmware or UEFI changes.
  • Consider migration.
  • If your hardware meets Windows 11 requirements, evaluate moving to Windows 11 sooner rather than later; it is the supported path and will keep you in the update pipeline.

Practical checklist for IT admins / enterprise teams​

  • Inventory every device that is outside Microsoft’s normal update pipeline: Windows 10 without ESU, servers with custom firmware, industrial devices, air-gapped endpoints, and VMs with embedded virtual firmware (OVMF).
  • Use management tools (WSUS, Windows Update for Business, SCCM/Intune) to approve and target the certificate rollout KBs where appropriate. Validate staging and rollouts in representative test groups first.
  • Coordinate with OEMs for firmware updates; some devices require a combined firmware + Windows Update path.
  • Check virtualization platform firmware images (OVMF/UEFI) for cloud and on-prem hypervisors. Update virtual firmware templates as needed.
  • Ensure BitLocker/drive-encryption recovery options are stored securely and that recovery keys are tested after firmware enrollment procedures.
  • For specialized systems that cannot be updated, prepare compensating controls: network isolation, application allowlists, enhanced monitoring, and scheduled replacement plans.

Edge cases and known hazards — what can go wrong, and how to avoid it​

  • Firmware resets or troubleshooting that reverts DB/KEK entries: Re-flashing or resetting firmware to defaults may remove the newly injected certificates and return the device to the older 2011-only state. Maintain recovery procedures and firmware images.
  • Devices with Secure Boot disabled or legacy BIOS: If Secure Boot is disabled, the automatic enrollment process that updates UEFI trust anchors may not complete. Re-enabling Secure Boot improperly, on systems installed with legacy (MBR) partitions, can render Windows unbootable unless you first convert the disk layout to GPT or reinstall. Proceed cautiously.
  • Risky third-party scripts: Community tools exist to modify UEFI variables; these are powerful and dangerous. Do not use community or unverified scripts to alter Secure Boot variables on production devices. Follow OEM and Microsoft guidance.
  • Virtual machines and cloud images: Some virtual firmware images do not accept the same update mechanisms. Validate with your hypervisor vendor.
  • Dual-boot machines (Windows + Linux): Some Linux boot shims rely on the older Microsoft CA; distributions and vendors have their own timelines for shim signing. Dual-boot users should follow distribution guidance and coordinate any manual update steps.

What Microsoft’s move reveals about platform maintenance and long-term security​

Certificate rotation at this scale is a sober reminder that platform security requires continuous, coordinated maintenance across hardware vendors, OS vendors, and application authors. Microsoft’s staged rollout — combining firmware pre-installation on new devices, a targeted Windows Update enrollment path, and cooperation with OEMs — is precisely how you should expect a responsible platform vendor to manage a mass-scale cryptographic rollover.
At the same time, the event highlights a perennial tension: users who choose to delay upgrades or cling to older OS versions create a friction point that affects the entire ecosystem. For those still on Windows 10, the ESU program buys time; it does not buy forever.

Clear, actionable recommendations​

  • If your PC meets Windows 11 requirements: upgrade now, or plan a controlled migration in the next 30–90 days. That guarantees continued access to Microsoft’s full servicing path.
  • If you must stay on Windows 10: enroll in ESU immediately and verify that your device is receiving the targeted KB that contains the Secure Boot enrollment logic (the January 2026 servicing wave includes this work). Don’t assume enrollment is automatic — verify.
  • For critical infrastructure and servers: treat this as a firmware and supply-chain problem. Contact OEMs, validate firmware images in lab, test update paths, and schedule maintenance windows.
  • For gamers and users of kernel-level anti-cheat: keep an eye on vendor advisories; many anti-cheat systems integrate Secure Boot assumptions and will follow hardware/OS vendor timelines.
  • Maintain robust backups and BitLocker recovery keys before any firmware changes. Firmware updates can interact unpredictably with full-disk encryption.

Final analysis — strengths, trade-offs, and risks​

Microsoft’s certificate refresh is defensible and technically necessary. Rotating a 15‑year-old certificate set ahead of cryptographic decay reduces long-term attack surface and allows Microsoft to ship finer-grained trust anchors. The staged update strategy minimizes risk by targeting devices with healthy update telemetry, and OEM coordination means many recent devices already shipped prepared for the change.
But there are trade-offs and operational risks:
  • The decision to tie the updates to the OS update pipeline effectively disadvantages users on unsupported releases. That is a deliberate policy choice: servicing requires a supported platform. It is defensible from an engineering standpoint, but it creates practical friction for users with legacy hardware or constrained upgrade paths.
  • The reliance on OEM firmware updates for some systems introduces supply-chain complexity: smaller vendors and some enterprise appliances could lag, creating patch gaps.
  • The incremental nature of the risk — a “degraded security state” rather than an immediate failure — makes it easy for individuals and organizations to procrastinate. That gradual erosion is the most insidious danger.
If you are still on Windows 10, treat this as a firm nudge into action. The certificate refresh is not an arbitrary slap; it’s a scheduled security lifecycle event that exposes how quickly unsupported systems decay in trust and capability.

Closing checklist — what to do before June 2026​

  • Verify Windows version and support status now (absolute date: confirm you are not on an unsupported build as of October 14, 2025 unless ESU is active).
  • Check Secure Boot state with msinfo32 and confirm firmware vendor guidance for your model.
  • Enroll in ESU if you have a justified need to remain on Windows 10 and want to stay in the update pipeline through October 13, 2026.
  • Back up BitLocker and recovery keys; create recovery media prior to any firmware updates.
  • For IT: inventory, test firmware and update paths, and coordinate with OEMs immediately — do not treat this as a routine patch.
This certificate refresh is a maintenance milestone the platform has been planning for years. For users still clinging to Windows 10 without ESU, it is the clearest possible signal that supported software lives matter: hardware, firmware, and OS need to be maintained together. Act now, or accept the slow, steady degradation of trust that follows.

Source: Daily Express https://www.express.co.uk/life-styl...indows-10-holdouts-another-kick-in-the-teeth/
 

Microsoft’s decision to rotate out 2011-era Secure Boot certificates has turned what many Windows 10 holdouts already feared into an urgent timetable: machines that remained on Windows 10 after Microsoft’s October 14, 2025 end-of-support date now face an additional, platform-level security gap when certificates begin expiring in June 2026. This is not a nebulous long-term risk — it’s a concrete, calendared technical change that will affect the integrity of the UEFI boot chain, and Microsoft is explicitly limiting automatic certificate delivery to devices that remain in the update pipeline (for most consumer Windows 10 devices that means enrollment in the Extended Security Updates program). osoft.com]

Blue-toned cyber scene with a glowing Secure Boot shield over a circuit board.Background​

The dual clocks: end-of-support and expiring certificates​

Two interlocking timelines matter here. First, Windows 10 mainstream support ended on October 14, 2025, which by itself removed free monthly security updates for the general Windows 10 population. Second, the cryptographic certificates that underpin Microsoft’s Secure Boot trust chain — keys originally issued around 2011 — were designed with finite lifetimes and begin to expire in June 2026, with additional certificate expiries scheduled through October 2026. Microsoft has announced a coordinated “generational refresh” that replaces the 2011 CA family with new 2023 CA certificates; the company and OEM partners are distributing these new certificates via firmware and Windows Update to keep the UEFI Secure Boot chain intact.

Why this landed in the headlines​

Mainstream outlets flagged a blunt intersection of policy and engineering: if your PC is on unsupported Windows 10 and not enrolled in ESU, Microsoft’s platform-level certificate refresh will not automatically target it, raising the prospect that such machines will enter a “degraded security state” after the 2011 certificates reach end-of-life. That phrase — degraded security state — is Microsoft’s way of saying the device will still boot in most cases but will be unable to receive new boot-level protections and revocations going forward. Security teams and everyday users both have good reasons to pay attention: boot-level attacks and bootkits are among the most difficult threats to detect and mitigate.

Overview: What is Secure Boot and why certificates matter​

Secure Boot in one paragraph​

Secure Boot is a UEFI-based mechanism that verifies cryptographic signatures on early-stage boot components — bootloaders, option ROMs, and kernel drivers — to ensure only trusted code runs before the operating system loads. It relies on a small set of trust anchors stored in firmware: KEK (Key Exchange Key), DB (Allowed signers), and DBX (Revoked/banned items). Those anchors are established by certificates issued by Microsoft and partner CAs; when the signing keys that those certificates support age out or expire, the mechanism loses its trusted update channel unless a certificate refresh occurs.

The certificate lifecycle problem​

Cryptographic certificates are time-limited by design. When the certificates used for KEK/DB/DBX approach their expiry dates, Microsoft and OEMs must proactively replace them so the platform can:
  • Receive future updates to what is allowed at boot (DB),
  • Receive new revocations for compromised or malicious boot components (DBX),
  • And maintain a secure, verifiable path for future boot manager and boot component updates.
Microsoft’s documentation lists the specific certificate changes and the roles they play; failure to refresh these trust anchors prevents the platform from applying new protections and revocation lists once the old certificates are no longer valid.

The exact timeline you need to know (absolute dates)​

Microsoft and multiple vendor advisories lay out the dates that matter. Use these calendar anchors in your planning — do not rely on vague relative phrases.
  • October 14, 2025 — Windows 10 mainstream support ended. Free monthly security updates for consumer Windows 10 editions stopped on this date unless systems enrolled in ESU.
  • June 2026 — The 2011 KEK and related UEFI CA certificates begin expiring; Microsoft warns some certificate expiries start in this month. Devices still using the 2011 certificates must receive updated 2023 certificates before this window to preserve the ability to receive future Secure Boot updates.
  • October 2026 — Additional expiries affecting Windows boot components occur by October 2026; consumer ESU coverage ends on October 13, 2026, which is the last date Microsoft promises to deliver critical and important updates for enrolled Windows 10 consumer devices.
These are hard deadlines for defenders: certificate rotation is a one-way operation for many devices and firmware stacks, and delayed action can leave large populations of devices unable to accept future countermeasures.

Who is affected — and who is not​

At greatest risk​

  • Windows 10 machines that were not upgraded and are not enrolled in the consumer ESU program. These devices may not receive Microsoft’s automatic certificate rollout via Windows Update and are therefore at risk of entering a degraded Secure Boot state after June 2026.
  • Older hardware whose OEM firmware does not accept the new certificates without a BIOS/UEFI update. Even if Microsoft pushes the new certificates via Windows Update, firmware that doesn’t persist or allow the new trust anchors will need an OEM firmware update. Dell, Red Hat, and other vendors have issued advisories urging firmware updates for affected server and enterprise platforms.
  • Specialized devices (appliances, certain IoT endpoints, servers running older Windows Server editions) that use custom firmware or have long maintenance cycles. These can require manual vendor intervention to prevent future incompatibility.

Less affected or safe​

  • Devices shipped since 2024 and many Windows 11 PCs are likely to already include the updated 2023 certificates in firmware and therefore will receive continuity without user action in most cases. Microsoft and OEMs have coordinated shipments of new hardware with the refreshed certificates pre-installed.
  • Windows 10 machines that enroll in the consumer ESU program will remain in the Microsoft update pipeline and can receive the certificate updates via Windows Update while their ESU subscription is active (through October 13, 2026 for consumer ESU). Enrollment comes with specific requirements, including use of a Microsoft Account for the consumer flow.

What Microsoft is rolling out (technical specifics)​

Microsoft’s Windows IT Pro blog and KB notes break down the certificate mapping and storage locations in UEFI:
  • Microsoft Corporation KEK CA 2011 → Microsoft Corporation KEK 2K CA 2023 (affects KEK; signs DB/DBX updates). Expiration: June 2026.
  • Microsoft Corporation UEFI CA 2011 → Microsoft Corporation UEFI CA 2023 and Microsoft Option ROM UEFI CA 2023 (affects DB). Expiration: June 2026.
  • Microsoft Windows Production PCA 2011 → Windows UEFI CA 2023 (signs Windows bootloader components). Expiration: October 2026.
Microsoft is using a mix of firmware updates from OEMs and Windows Update-delivered updates to deploy the new certificates, and some updates include registry keys and configuration values to let administrators control the rollout (for example, options exposed through Controlled Feature Rollout and Group Policy/Intune to manage the update path). However, the fundamental constraint remains: if Microsoft does not have the device in the update pipeline, the automatic distribution path will not reach it.

What to do now — practical advice for home users and IT teams​

Below are concrete, prioritized actions. Treat the June 2026 certificate expiry window and the October 2026 ESU end date as fixed milestones in your migration plan.

For home users (non-IT)​

  • Check whether your PC is already on Windows 11. If it is, your risk is lower because most Windows 11 hardware ships with the updated 2023 certificates. If your PC is eligible for Windows 11 and you can accept its hardware and account requirements, plan to upgrade; it is the simplest long-term remedy.
  • If you must remain on Windows 10 temporarily, enroll in consumer ESU to remain in the Windows Update pipeline through October 13, 2026. Enrollment options include a $30-per-device paid option, Microsoft Rewards redemption, or using Microsoft account-backed cloud sync options that Microsoft provided as a free enrollment path for many consumers. Note: consumer ESU enrollment requires a Microsoft Account.
  • Update your system firmware (BIOS/UEFI) if your OEM has published updates. Visit your PC vendor’s support page and install available firmware updates before June 2026. This is particularly important for laptops and prebuilt desktops shipped in 2019–2023.
  • Use the built-in PowerShell commands to check Secure Boot status and certificate info:
  • Confirm-SecureBootUEFI
  • Get-SecureBootPolicy
    These commands let you confirm whether Secure Boot is enabled and inspect the policy data on your machine. If you are uncomfortable with these tools, seek vendor guidance or help from a knowledgeable friend.

For IT managers and sysadmins​

  • Inventory: Produce a list of all UEFI-enabled endpoints and identify firmware versions, Secure Boot status, and the certificate chain installed in firmware.
  • Prioritize: Devices with sensitive data or remote access get top priority for firmware and Windows updates.
  • Test: In a lab, validate the certificate refresh steps. Test boot behavior after firmware and OS patches are applied. Look for unintended side effects: custom bootloaders, unsigned option ROMs, and older hypervisor/provisioning tool chains are common trouble spots.
  • OEM engagement: Contact hardware vendors to confirm which platforms will receive firmware updates that include the 2023 certificates. Get timelines and test builds. Dell, HP, Lenovo, and major server vendors have published targeted guidance; rely on vendor statements for server firmware timelines.
  • Enrollment & policy: Configure Controlled Feature Rollout (if applicable), GPOs, or Intune policies to opt devices into Microsoft’s certificate update flow where necessary. Microsoft’s updates expose registry keys and update controls to assist enterprise rollouts.

Risk analysis: strengths, weaknesses, and blind spots in Microsoft’s approach​

Notable strengths​

  • Proactive, coordinated refresh: Microsoft’s early, public timetable and the 2023 certificate issuance give vendors and administrators time to plan, test, and deploy firmware and OS updates. That reduces the chance of a chaotic “mass expiry” event.
  • Multiple distribution paths: Certificates are being delivered via OEM firmware on new hardware and Windows Update for existing devices; this multi-path approach improves overall coverage and reduces single points of failure.
  • Granularity in the new CA family: Splitting certificate roles (for option ROMs vs third-party OS signing) gives administrators more control over future trust decisions and reduces the blast radius of a single key compromise.

Significant risks and trade-offs​

  • Policy gating via ESU leaves many devices exposed. Microsoft’s rule that unsupported Windows 10 devices not enrolled in ESU will not receive the certificate updates is operationally effective (it limits the platform’s support surface) but creates a sharp discontinuity for millions of devices. For households and smaller organizations that declined enrollment or declined to migrate, the result is an abrupt move from “security updates” to “degraded security state.” This is both a security risk and a practical support burden.
  • Firmware fragmentation remains the wildcard. Even where Microsoft pushes the new certificates, a device’s firmware must accept and persist the new trust anchors. Older or vendor-customized UEFI implementations could block or mishandle the update, requiring vendor firmware updates that may or may not arrive in time. Server vendors and enterprise OEMs are explicitly calling out this dependency.
  • User experience and account requirements. The consumer ESU enrollment path that offers free options (Microsoft Rewards or OneDrive backup sync) still requires a Microsoft Account for enrollment — a political and UX friction point for many users who intentionally maintain local-only Windows accounts. That gating will leave a subset of consumers effectively blocked from receiving updates unless they alter account practices.
  • Potential for compatibility headaches. Systems that rely on older third-party bootloaders, custom shims (common in some Linux dual-boot setups), or unsigned option ROMs may require manual intervention to preserve compatibility. Red Hat and similar OS vendors are already preparing updated shims and guidance for their customers.

How to test and verify on your machines (step-by-step)​

  • Back up your system and create a recovery drive. Firmware and boot changes can be disruptive; ensure you have a tested recovery plan.
  • Ensure Windows is fully updated (install servicing stack updates and the latest cumulative rollups).
  • For Windows 10 consumer devices planning to stay on 10: enroll in ESU (Settings > Windows Update > look for ESU/enroll wizard) or redeem via the supported consumer options (Microsoft Account required). Confirm enrollment by verifying the system shows ESU eligibility messages.
  • Check Secure Boot status:
  • Open PowerShell as admin and run Confirm-SecureBootUEFI.
  • Run Get-SecureBootPolicy to inspect enrolled certificates/policy.
  • Monitor Windows Update for targeted KBs that include certificate updates (watch for new Windows Update KBs or Microsoft guidance for Controlled Feature Rollout keys). For servers, consult the vendor KBs for the exact firmware patch schedule and test in a staging environment.

What to expect if you do nothing​

Do-nothing outcomes vary by hardware and usage, but the likely results are:
  • Devices may continue to boot ordinarily for some time, but the platform cannot receive future Secure Boot database updates or revocations after the 2011 certificates expire.
  • Over time, the inability to distribute revocations or mitigations will increase the attack surface to boot-level malware and bootkits, and future signed boot components that rely on the 2023 CA family will not be trusted.
  • Vendors and Microsoft may need to implement emergency mitigations if a large scale of devices falls into an unprotected state, but relying on emergency responses is poor risk management. Plan and act now.

Conclusion — the pragmatic path forward​

Microsoft’s Secure Boot certificate refresh is a genuine, technical necessity; certificates do not last forever and the firm’s timetable is explicit. The crunch for Windows 10 holdouts is that the OS’s end-of-support deadline (October 14, 2025) and the certificate expiries (starting June 2026) create a compressed window where users must choose between upgrading to a supported OS, enrolling in the time-limited ESU program (with its account and enrollment constraints), or accepting growing security and compatibility risk.
For individuals: if your PC supports Windows 11, upgrade; if not, enroll in consumer ESU and ensure firmware updates are applied. For IT teams: treat this as an urgent migration and firmware-management project — inventory, test, firmware-patch, and migrate. Do not treat “degraded security state” as theoretical; for sensitive environments, the ability to receive boot-level revocations and protections is an essential part of a defense-in-depth strategy.
Finally, this is a reminder that platform-level hygiene — rotation of cryptographic trust anchors, coordinated firmware-and-OS updates, and clear, absolute dates for action — is not an abstract bureaucracy. It is the technical scaffolding that keeps modern devices secure. The calendars listed earlier are your planning anchors: note them, act on them, and get your devices onto a supported, updateable path before the certificates start to expire this June.

Source: Daily Express Microsoft gives Windows 10 holdouts another kick in the teeth | Express.co.uk
 

Back
Top