Microsoft’s September preview update pushed an urgent reminder to IT teams and advanced users: Secure Boot certificates used broadly across Windows devices are scheduled to start expiring in June 2026, and without coordinated firmware and OS updates some machines may be unable to boot securely or apply pre-boot fixes.
Microsoft published KB notifications for the September 23, 2025 preview flight (KB5065790) that bundle targeted reliability fixes for Windows 11 while also drawing attention to a looming platform-level maintenance task: the rotation and renewal of Secure Boot root and signing certificates that were originally provisioned around 2011. That advisory is not a minor housekeeping note — it has direct implications for Secure Boot behavior and pre-boot integrity checks on many consumer and business devices.
To understand why this matters, remember that Secure Boot is a UEFI firmware feature that enforces a signature chain for boot-time binaries (bootloaders, drivers, recovery tools). The chain trusts certificates and keys provisioned in platform variables such as KEK, DB, and DBX. When those trust anchors expire or are removed without being replaced by valid attestations, UEFI can refuse to load signed components — or, under strict policies, refuse to boot entirely. Microsoft’s update guidance and preview KB explicitly warns that certificates issued in 2011 are scheduled to begin expiring starting June 2026 and that administrators should plan now to avoid disruption.
Caveat: while the high‑level expiry timeline and recommended mitigation strategy are consistently reported, exact lists of affected OEM models, firmware versions, or device counts are not published by Microsoft in the KB preview. Those device-level details are OEM-managed and therefore require checking vendor advisories. Treat any specific device-impact claims that are not published by OEMs or Microsoft as unverifiable until confirmed.
Start now: inventory devices, confirm OEM update paths, pilot updates on representative hardware, and prepare replacement plans for unsupported devices. When in doubt, treat vendor advisories as authoritative for firmware behavior, and rely on staged, telemetry-driven rollouts to minimize risk. Microsoft and independent reporting align on the core facts and the June 2026 timeline, but exact device impacts will depend on OEM responses and individual fleet characteristics — those are the variables that IT teams must resolve in the coming months.
Source: Microsoft Support September 23, 2025—KB5065790 (OS Build 22621.5984) Preview - Microsoft Support
Background / Overview
Microsoft published KB notifications for the September 23, 2025 preview flight (KB5065790) that bundle targeted reliability fixes for Windows 11 while also drawing attention to a looming platform-level maintenance task: the rotation and renewal of Secure Boot root and signing certificates that were originally provisioned around 2011. That advisory is not a minor housekeeping note — it has direct implications for Secure Boot behavior and pre-boot integrity checks on many consumer and business devices.To understand why this matters, remember that Secure Boot is a UEFI firmware feature that enforces a signature chain for boot-time binaries (bootloaders, drivers, recovery tools). The chain trusts certificates and keys provisioned in platform variables such as KEK, DB, and DBX. When those trust anchors expire or are removed without being replaced by valid attestations, UEFI can refuse to load signed components — or, under strict policies, refuse to boot entirely. Microsoft’s update guidance and preview KB explicitly warns that certificates issued in 2011 are scheduled to begin expiring starting June 2026 and that administrators should plan now to avoid disruption.
What KB5065790 actually contains (executive summary)
Targeted quality fixes in the preview build
KB5065790 is a Release Preview quality update focused on stability- and reliability-type fixes rather than new features. The publicly highlighted fixes address:- A sign-in hang on devices when entering a SIM PIN at the lock screen (WWAN/eSIM devices).
- Updates to Country and Operator Settings Asset (COSA) and carrier profile handling.
- Display/kernel stability problems affecting multi-monitor Remote Desktop sessions and unexpected shutdowns during undocking.
- Rendering issues with Chinese IME input.
- Crashes when opening shared printer queues in Settings.
- Minor metadata/service description fixes.
The Secure Boot certificate advisory bundled with the update
Separately and more consequential for long-term platform hygiene, Microsoft reiterated that older Secure Boot certificates — originally issued circa 2011 — will begin expiring in mid‑2026. If devices are not updated with the new certificate set (through firmware updates, OS certificate packages, or OEM-supplied processes), those devices could fail Secure Boot validation or be prevented from applying pre-boot patches. Microsoft documented a multi-pronged rollout to replace platform KEK/DB certificates and provide OS-level updates where applicable.Why the certificate expiry is a real risk (technical analysis)
Secure Boot’s trust model depends on concrete cryptographic anchors that have real-world lifetimes. Certificates created in 2011 were expected to reach the end of their useful life in the 2025–2026 timeframe; the practical effects that Microsoft warns about are:- Pre-boot updates or recovery components signed under the expiring certificate chain may no longer validate, preventing tasks like offline servicing or firmware-assisted recovery.
- Under strict Secure Boot policy settings, the firmware may treat failure to validate boot components as an immediate condition to block boot, producing boot failures in already-deployed fleets.
- Some OEMs or managed fleets with locked-down firmware policies may be unable to accept an in-field certificate substitution without an OEM-provided firmware update or explicit management workflow.
Dual‑build family nuance (22621 vs 22631)
If you cross-check the KB entry and vendor summaries you’ll notice variation in build numbering: Microsoft services Windows 11 with parallel build families (commonly 22621 and 22631), and the same KB textual content may be packaged with different build numbers for the two families. The Release Preview notes and community analysis reflect this duality — e.g., KB5065790 appears in the Release Preview stream as Build 22631.5982 while preview packaging for other servicing families may show 22621.x variants. Administrators should confirm the specific build number that targets their SKU/build family before deployment.Cross‑referencing and verification
Multiple independent reporting and community analysis posts mirror Microsoft’s advisory and expand on operational concerns, confirming the expiry timeline and the recommended actions for admins. Reporting from mainstream Windows coverage and security-focused outlets reiterates the June 2026 timeframe and notes that Microsoft has outlined CA/KEK update approaches to prevent boot-time disruption. Cross-checking Microsoft’s KB language against independent summaries is consistent: the expiry window, the impacted certificate set (issued in 2011), and the remediation pattern (replace certificates via firmware and OS-delivered updates) are corroborated across several independent sources.Caveat: while the high‑level expiry timeline and recommended mitigation strategy are consistently reported, exact lists of affected OEM models, firmware versions, or device counts are not published by Microsoft in the KB preview. Those device-level details are OEM-managed and therefore require checking vendor advisories. Treat any specific device-impact claims that are not published by OEMs or Microsoft as unverifiable until confirmed.
Impact matrix — who to worry about first
- Enterprise fleets with mixed OEM hardware and locked firmware policies: High priority. These environments often enforce strict Secure Boot policies and may not accept ad-hoc certificate changes without vendor involvement.
- Devices used in field or remote scenarios (WWAN/eSIM laptops, kiosk devices, point-of-sale): High priority. If those devices cannot receive firmware updates easily, a certificate expiry could effectively prevent secure boot or recovery.
- Recent consumer PCs with modern UEFI firmware and OEM update channels: Lower immediate risk, but still require verification that the OEM firmware exposes new trust anchors or that Windows update packages will supply necessary CA updates.
- Older hardware where OEM update support has ended: Elevated risk. End-of-support firmware may not receive the necessary KEK/DB changes; these devices may need a replacement plan before June 2026.
Recommended mitigation and remediation checklist (for IT teams)
- Inventory and classify devices now (by May–June 2026 timeline):
- Identify models, OEM firmware versions, and where possible the Secure Boot variable state (KEK/DB contents).
- Flag devices that cannot be updated via standard OEM channels or that are out of vendor support.
- Confirm OEM firmware update availability:
- Contact OEM support or check vendor advisory pages for explicit guidance about accepting the replacement CA/KEK set for Secure Boot.
- Prioritize testing on devices that represent critical workflows (kiosks, remote workers, POS). Microsoft also recommends pilots in Release Preview or a staging ring.
- Ensure Windows update pipelines will apply OS-level CA updates:
- Microsoft indicated a multi-pronged approach that includes OS-side CA/KEK updates where applicable. Confirm that your update management (WSUS, SCCM/ConfigMgr, Intune) is prepared to deliver these servicing updates.
- Test Secure Boot behavior after applying the recommended updates:
- Use a controlled lab to verify boot behavior, pre-boot repair scenarios, and recovery tooling after installing the new certificate set.
- Observe for regressions for at least 48–72 hours in real-world use as Microsoft suggests for Release Preview builds.
- Maintain rollback and recovery plans:
- Capture system images and ensure offline recovery media are available before broad deployment.
- Understand uninstall semantics for combined SSU/LCU packages — in many cases the servicing stack update cannot be uninstalled once applied. That has operational consequences during remediation.
- Build a replacement plan for unsupported hardware:
- For machines that will not receive firmware updates or OS-side certificate refreshes, budget and schedule hardware replacement prior to the date certificates begin expiring (June 2026).
- Communicate timelines and user-impact expectations:
- Provide status updates to stakeholders and end users. For remote or kiosk systems, schedule maintenance windows or physical service visits where needed.
Actionable steps for consumer users (concise)
- Keep Windows Update enabled and fully applied; Microsoft is delivering part of the solution via OS updates for supported devices.
- Check your PC vendor’s support site for firmware/BIOS/UEFI updates and apply them per vendor instructions.
- If you have an older PC and the vendor has no updates, plan for replacement before June 2026 if you require Secure Boot-based protections.
- For advanced users: confirm Secure Boot variable signatures via UEFI firmware UI or vendor tooling, but avoid ad-hoc changes to Secure Boot variables without clear vendor guidance.
Testing and validation — a suggested pilot plan
- Select a small, representative pilot group (10–50 devices) including:
- A mix of OEM models and firmware versions
- At least one device per critical workflow (VPN + WWAN, docked workstation, kiosk/POS)
- Create full device backups or system images.
- Apply the Microsoft preview/production updates and OEM firmware updates per vendor guidance.
- Perform these validation checks:
- Normal boot with Secure Boot enabled
- Offline recovery using pre-boot tools
- Windows Update and servicing stack behavior
- Application of any pre-boot or recovery signing tests you have in your environment
- Monitor for 72 hours and collect logs for any anomalies; escalate to vendor support if you find a regression. Microsoft’s Release Preview guidance recommends this staged, telemetry-aware approach.
What’s uncertain and what to watch for (risks and caveats)
- Vendor coverage variability: Microsoft can publish OS-side updates, but OEM firmware changes are required in many cases. The availability and timing of those firmware updates is controlled by OEMs, not Microsoft, and is thus the single largest operational risk. Any claims about a specific OEM’s readiness that are not published by the OEM should be treated as unverified.
- Device-level behavior differences: The KB and community analysis deliberately do not list every affected model. Test results may vary even between units of the same model due to differences in firmware configuration, custom management policies, or enterprise provisioning. Treat any model-level impact statements that are not confirmed by OEM advisories as speculative.
- Uninstall and recovery complexity: Some servicing packages combine SSU and LCU components that cannot be removed after install. That limits quick rollback choices if the update/pilot reveals regressions. Maintain offline images and recovery media as a contingency.
- Timeline awareness: the advisory points to certificate expiry beginning in June 2026. That gives a finite runway, but planning and execution at scale (fleet-wide firmware distribution, pilot validation, replacement procurement) can take months. Treat the date as a hard planning target.
Recommended communication and governance steps
- Treat Secure Boot certificate rotation as an organizational milestone similar to a planned TLS root rotation: inventory, validate, stage, and execute with rollback and auditing.
- Assign a cross-functional team: firmware/OEM liaison, patch management, endpoint security, and infrastructure teams should collaborate to ensure no single team is surprised.
- Add monitoring and alerting for boot failures and pre-boot repair events to catch regressions early after staged rollouts.
- Document the pilot results and produce a deployment runbook that includes OEM-specific steps, validation commands, and rollback triggers.
Conclusion
Microsoft’s KB5065790 preview brings the usual assortment of targeted quality fixes for Windows 11, but its accompanying advisory on the June 2026 Secure Boot certificate expiration elevates this release from "routine patch" to a serviceability planning event. The technical reality is clear: cryptographic trust anchors have finite lifetimes, and in complex mixed-fleet environments the interplay between OEM firmware, OS-level CA updates, and management tooling determines whether an organization experiences seamless rotation or disruptive boot failures.Start now: inventory devices, confirm OEM update paths, pilot updates on representative hardware, and prepare replacement plans for unsupported devices. When in doubt, treat vendor advisories as authoritative for firmware behavior, and rely on staged, telemetry-driven rollouts to minimize risk. Microsoft and independent reporting align on the core facts and the June 2026 timeline, but exact device impacts will depend on OEM responses and individual fleet characteristics — those are the variables that IT teams must resolve in the coming months.
Source: Microsoft Support September 23, 2025—KB5065790 (OS Build 22621.5984) Preview - Microsoft Support