Windows 10: What methods will be available to update Windows Secure Boot Certificates?

Discus and support What methods will be available to update Windows Secure Boot Certificates? in Windows 10 Software and Apps to solve the problem; Hi there,I've recently become aware of the article below which suggests that we will need to update Windows secure boot certificates on devices before... Discussion in 'Windows 10 Software and Apps' started by Simon Neild, Jul 2, 2025 at 9:42 AM.

  1. What methods will be available to update Windows Secure Boot Certificates?


    Hi there,I've recently become aware of the article below which suggests that we will need to update Windows secure boot certificates on devices before June 2026;Windows Secure Boot certificate expiration and CA updates - Microsoft SupportThe article suggests that "Microsoft will manage the update process for these new certificates on a significant portion of Windows devices". Can you confirm how this will happen please? Also, the term 'significant portion' would suggest that these updates may be limited to certain OS versions?We use WSUS here so will updates available to deploy to machines v

    :)
     
    Simon Neild, Jul 2, 2025 at 9:42 AM
    #1

  2. Windows 8 Secure Boot Feature: Not So Secure?

    So Linux is switching to secure boot also? Or they have to because of UEFI?
     
  3. newtekie1 Win User
    Windows 8 Secure Boot Feature: Not So Secure?

    • Linux
    • Linux
    • Linux
    • Linux
    • Oh and OSX
    Here is a statement from a Kernal Developer at Red Hat:

    I'm not sure this exploits the legacy BIOS but rather it exploits the legacy boot method on MBR drives, injecting a signed key before the OS boots, which you are correct in that it has nothing to do with Windows 8. And the simplest fix would just be to require boot drives use GPT when Secure Boot is enabled in UEFI.
     
  4. Brink Win User

    What methods will be available to update Windows Secure Boot Certificates?

    Updating Microsoft Secure Boot keys

    Windows IT Pro Blog: Microsoft, in collaboration with our ecosystem partners, is preparing to roll out replacement certificates thatll set new Unified Extensible Firmware Interface (UEFI) Certificate Authorities (CAs) trust anchors in Secure Boot for the future. Look out for Secure Boot database updates rolling out in phases to add trust for the new database (DB) and Key Exchange Key (KEK) certificates. This new DB update is available as an optional servicing update for all Secure Boot enabled devices from February 13, 2024. What is Secure Boot? Secure Boot is a security feature in the UEFI that helps ensure that only trusted software runs during the systems boot sequence. It works by verifying the digital signature of any software against a set of trusted digital keys stored in the UEFI. As an industry standard, UEFIs Secure Boot defines how platform firmware manages certificates, authenticates firmware, and how the operating system (OS) interfaces with this process. For more details on UEFI and Secure Boot, please refer to this article. Secure Boot was first introduced to Windows systems with the Windows 8 release to protect against the emerging pre-boot malware (bootkit) threat at that time. Since then, Secure Boot has continued to be a part of Microsoft's Trusted Boot security architecture. Secure Boot authenticates modules such as UEFI firmware drivers, bootloaders, applications, and option ROMs (Read-Only Memory), which are firmware run by the PC BIOS during platform initialization, before they are all executed. As the final step of the Secure Boot process, the firmware verifies the Windows boot loader is trusted by Secure Boot and then passes control to the boot loader which in turn verifies, loads into memory, and launches Windows. This process coupled with the UEFI firmware signing process helps to ensure that only verified code executes before Windows, preventing attackers from utilizing the boot path as an attack vector. To learn more about how Secure Boot fits in with the overall Windows chip-t-cloud security, please refer to the Windows Security Book RWMyFE. Trust and authenticity in Secure Boot are built using the Public-Key Infrastructure (PKI). This establishes a certificate management system which utilizes CAs to store digital certificates. These CAs, consisting of Original Equipment Manufacturer (OEM) or their delegates and Microsoft, generate key pairs that form the root of trust of a system.
    What methods will be available to update Windows Secure Boot Certificates? [​IMG]
    Secure Boot “root of trust”: Setting trust anchors for the future Secure Boots root of trust utilizes a hierarchical system, where the Platform Key (PK) is typically managed by the OEM and used to sign updates to the KEK database. The KEK in turn signs updates to both the Allowed Signature DB and the Forbidden Signature Database (DBX). The Secure Boot Allowed Signature DB and the DBX are integral to the functionality of Secure Boot. Bootloader modules signing authority must be allowlisted by the Secure Boot DB, while the DBX is used for revoking previously trusted boot components. Updates to the DB and DBX must be signed by a KEK in the Secure Boot KEK database. The configuration of Secure Boot DB and KEK for Windows devices has remained the same since Windows 8. Microsoft requires every OEM to include the same three certificates managed by Microsoft for Windows and in support of the third-party hardware and OS ecosystem. These include the Microsoft Corporation KEK CA 2011 stored in the KEK database, and two certificates stored in the DB called the Microsoft Windows Production PCA 2011, which signs the Windows bootloader, and the Microsoft UEFI CA 2011 (or third-party UEFI CA), which signs third-party OS and hardware driver components. All three of these Microsoft certificates expire in 2026. So, in collaboration with our ecosystem partners, Microsoft is preparing to roll out replacement certificates that will set new UEFI CA trust anchors for the future. Microsoft will be rolling out Secure Boot database updates in phases to add trust for the new DB and KEK certificates. The first DB update will add the Microsoft Windows UEFI CA 2023 to the system DB. The new Microsoft Windows UEFI CA 2023 will be used to sign Windows boot components prior to the expiration of the Windows Production CA 2011. This DB update will be optional for the February 2024 servicing and preview updates, and can be manually applied to devices. Microsoft will slowly roll out this DB update as we validate devices and firmware compatibility globally. The full DB updates controlled-rollout process to all Windows customers will begin during the 2024 April servicing and preview updates, ahead of the certificate expiration in 2026. Meanwhile, efforts to update the Microsoft UEFI CA 2011 (aka third-party UEFI CA) and Microsoft Corporation KEK CA 2011 will begin late 2024, and will follow a similar controlled rollout process as this DB update. While Microsoft has frequently performed DBX updates globally since the inception of Secure Boot, this will be the first DB update performed on such a large scale. Were actively collaborating with our OEM partners to identify and address bugs in firmware implementation that could result in unbootable systems or render a device unreceptive to the DB update. To ensure a successful rollout, devices with identified issues will be suspended from receiving the update until a fix is released. Microsoft is taking a very deliberate and cautious approach to rolling out this update. With this DB update, Microsoft will sustain its ability to service all Windows devices boot components. Guidance to manually apply DB update The DB update is available on February 13, 2024, along with manual steps to allow customers to test for firmware compatibility, especially for organizations with fleets of devices. If you would like to manually apply the DB update to validate that your system is compatible, please read the following instructions. These actions should be completed with non-critical hardware representing devices in your environment. Pre-requisite checks Before attempting the DB update, please ensure to perform the necessary pre-requisite checks:
    1. If you intend to manually apply this update to a large group of devices, we advise that you begin by rolling out to individual devices with the same firmware and specifications first to minimize the risks in the case of firmware bugs in your devices.
    2. Please verify that your UEFI firmware version is the most recent available version by your firmware vendor or OEM.
    3. For data backup steps, please refer to this guide.
    4. If you use BitLocker or if your enterprise has deployed BitLocker on your machine, ensure to backup BitLocker Keys:
        1. See this portal to ensure your BitLocker keys are backed up before your next reboot for your selfhost device. In the unlikely event that device becomes inoperable after receiving the update, the hard drive can still be unlocked.
        2. If the keys are backed up, the UI should resemble the following:
          What methods will be available to update Windows Secure Boot Certificates? [​IMG]
      1. If the keys are not backed up, please open Windows Search to search for “Manage BitLocker” and select Back up your recovery key followed by Save to your Azure AD or MSA account.
      What methods will be available to update Windows Secure Boot Certificates? [​IMG]

      What methods will be available to update Windows Secure Boot Certificates? [​IMG]

      What methods will be available to update Windows Secure Boot Certificates? [​IMG]
    For users that use a local account instead of an Azure Active Directory (AAD) or Microsoft account (MSA), you can print your recovery password, save to a file, and store it in a secure location. Formal DB update steps
    1. Apply the February 2024 (or later) security update.
    2. Open a PowerShell console and ensure that PowerShell is running as an administrator before running the following commands:
      1. Set the registry key to Set-ItemProperty -Path “HKLM:\SYSTEM\CurrentControlSet\Control\SecureBoot” -Name “AvailableUpdates” -Value 0x40
      2. Run the following scheduled task as Start-ScheduledTask -TaskName “\Microsoft\Windows\PI\Secure-Boot-Update”
    3. Reboot the machine twice after running these commands to confirm that the machine is booting with the updated DB.
    4. To verify that the Secure Boot DB update was successful, open a PowerShell console and ensure that PowerShell is running as an administrator before running the following command: [System.Text.Encoding]::ASCII.GetString((Get-SecureBootUEFI db).bytes) -match ‘Windows UEFI CA 2023’
      What methods will be available to update Windows Secure Boot Certificates? [​IMG]
    If the command returns True, the update was successful. In the case of errors while applying the DB update, please refer to the article, KB5016061: Addressing vulnerable and revoked Boot Managers. Source: https://techcommunity.microsoft.com/...s/ba-p/4055324
     
Thema:

What methods will be available to update Windows Secure Boot Certificates?

Loading...
  1. What methods will be available to update Windows Secure Boot Certificates? - Similar Threads - methods available update

  2. What methods will be available to update Windows Secure Boot Certificates?

    in Windows 10 Gaming
    What methods will be available to update Windows Secure Boot Certificates?: Hi there,I've recently become aware of the article below which suggests that we will need to update Windows secure boot certificates on devices before June 2026;Windows Secure Boot certificate expiration and CA updates - Microsoft SupportThe article suggests that "Microsoft...
  3. How to Obtain Microsoft Secure Boot Certificate?

    in Windows 10 Gaming
    How to Obtain Microsoft Secure Boot Certificate?: I’ve read that Microsoft offers a service to analyze and sign non-Microsoft bootloaders so they’re trusted by all “Certified for Windows” PCs. I’m interested in getting my current Linux bootloader signed. I came across this article describing certain requirements. Does anyone...
  4. How to Obtain Microsoft Secure Boot Certificate?

    in Windows 10 Software and Apps
    How to Obtain Microsoft Secure Boot Certificate?: I’ve read that Microsoft offers a service to analyze and sign non-Microsoft bootloaders so they’re trusted by all “Certified for Windows” PCs. I’m interested in getting my current Linux bootloader signed. I came across this article describing certain requirements. Does anyone...
  5. Security certificate

    in Windows 10 Gaming
    Security certificate: If this question doesn't bleong here move it or delete it.Windows 11 Pro, desktop computer. Computer is wired to AT&T modem. Computer is turned on. Unplug the electricity to AT&T modem to refresh the Internet connection. Plug the modem's electricity back in. A popup window...
  6. Security certificate

    in Windows 10 Software and Apps
    Security certificate: If this question doesn't bleong here move it or delete it.Windows 11 Pro, desktop computer. Computer is wired to AT&T modem. Computer is turned on. Unplug the electricity to AT&T modem to refresh the Internet connection. Plug the modem's electricity back in. A popup window...
  7. After 20H2 update: "Windows Security's" Publisher Certificate "Expired" but "Certificate is...

    in Windows 10 Ask Insider
    After 20H2 update: "Windows Security's" Publisher Certificate "Expired" but "Certificate is...: [ATTACH] submitted by /u/winfeeling [link] [comments] https://www.reddit.com/r/Windows10/comments/m9od9d/after_20h2_update_windows_securitys_publisher/
  8. Certificate security

    in Windows 10 BSOD Crashes and Debugging
    Certificate security: I have noticed my computers are acting weird. Anti-malware has been run on both computers. My laptop started a download called "ELERA". This is said to be a touch pad driver however this is not the case. My desktop has an usual traffic as well there, applications are opening...
  9. security certificate

    in AntiVirus, Firewalls and System Security
    security certificate: I keep getting a security certificate warning because the one I have is outdated. How do I get a current one? https://answers.microsoft.com/en-us/windows/forum/all/security-certificate/50fb16c8-dc1a-402f-8283-d483aaf7eeef"
  10. Security Certificate

    in AntiVirus, Firewalls and System Security
    Security Certificate: I think I have been scammed by a business. They supposedly help me when my computer has issues. They called and said {and showed me} that I have all of these error messages because my security certificate has expired. They want a rather hefty sum to reinstate my certificate....