Script:
  • Security Advisory – Deadline Approaching soon: Update your Microsoft Secure Boot Certificates


  • Home
  • Blog
  • Security Advisory – Deadline Approaching soon: Update your Microsoft Secure Boot Certificates
May 21, 2026

Secure Boot is a foundational security feature of the Windows experience, providing protection from the moment a device powers on. It operates at the firmware level, running before the operating system loads to ensure that only trusted, digitally signed software can be executed during the startup sequence.

This protection is enforced through cryptographic certificates (also known as Certificate Authorities or CAs) stored directly in your motherboard’s UEFI firmware. These certificates form a “chain of trust”:

  • Platform Key (PK): The root of trust, typically managed by the device manufacturer.
  • Key Enrollment Key (KEK): Authorizes updates to the signature databases.
  • Allowed Signature Database: A “guest list” of trusted certificates allowed to sign bootloaders, drivers, and firmware components.
  • Forbidden Signature Database: A “blocklist” of known-bad software signatures that should never be allowed to run.

Why You Need to Validate and Update Your Systems

The original Secure Boot certificates, issued in 2011, are reaching the end of their planned 15-year lifecycle. While your PC will not suddenly stop booting once these expire, it will enter a “degraded security state”.

Key reasons to update include:

  • Loss of Security Fixes: After expiration, devices will lose the ability to receive security updates for the Windows Boot Manager and early-stage startup components.
  • Vulnerability to Bootkits: Systems will remain vulnerable to sophisticated boot-level malware, such as the BlackLotus UEFI bootkit, which can bypass security even on fully updated systems if the revocation list (DBX) cannot be updated.
  • Compatibility Issues: Over time, newer hardware, firmware, or operating systems may fail to load because they require updated certificates for trust verification.

Critical Deadlines

You must ensure your systems are transitioned to the new 2023 certificate chain before these dates:

June 24, 2026: Microsoft Corporation KEK CA 2011 expires.

June 27, 2026: Microsoft Corporation UEFI CA 2011 expires.

October 19, 2026: Microsoft Windows Production PCA 2011 (which signs the Windows bootloader) expires.

How to Confirm Your Systems Are Updated

Microsoft is rolling out these updates gradually through monthly cumulative updates. For many Windows 11 users, the February 10, 2026, update (KB5077181) is a primary vehicle for these security fixes and improvements.

1. Look for the Relevant Update

On Windows 11, version 24H2 and 25H2, you should confirm the installation of KB5077181. While this specific KB provides targeting data to identify device readiness for new certificates, you should generally ensure your system is running the latest cumulative updates from early 2026 onwards.

2. Run a PowerShell Check

To verify if your firmware has officially accepted the new Windows UEFI CA 2023 certificate, you can run a command in PowerShell.

Steps:

  1. Open PowerShell as an Administrator.
  2. Run the following command to scan your system’s signature database: [System.Text.Encoding]::ASCII.GetString((Get-SecureBootUEFI db).bytes) -match ‘Windows UEFI CA 2023’.

Understanding the Result:

  • True: Your system has been officially updated with the 2023 certificate and is future-proof.
  • False: Your system is still relying on the legacy 2011 certificate and requires updates before the 2026 deadlines.

3. Check Windows Security App

Starting in April 2026, the Windows Security app will display a status badge under Device security > Secure Boot. A green checkmark with the text “Secure Boot is on and all required certificate updates have been applied” indicates your system is fully protected

NAVNET PARTNERS


  • Auvik
  • Cisco
  • Cisco/Meraki
  • CrowdStrike
  • Dell/EMC
  • F5
  • Fortinet
  • HPE/Aruba
  • Information Security (vCISO)
  • Juniper
  • BEI Construction
  • End-User Security Awareness
  • Microsoft
  • Microsoft Services
  • Nakivo
  • OKTA
  • Palo Alto Networks
  • Progress Software
  • PulseSecure
  • Rubrik
  • Scale Computing
  • Solarwinds
  • Symantec
  • ZenDesk
  • Zoom

Contact information

© 2022 NavNet. All rights reserved. Website developed by Nido Interactive.