Windows Secure Boot Certificates Near Expiration, Risking Boot Failures Without Updates

Related

VoiceRun’s $5.5M Seed Round Signals Enterprise Voice AI Maturation

What happened VoiceRun, a Cambridge, Massachusetts–based startup offering a code‑first...

Pax8 Email Error Exposes MSP Partner Licensing and Customer Lists

What happened A Pax8 email error exposes MSP partner licensing...

Victorian Department of Education Breach Exposes Student Account Data

What happened A Victorian Department of Education breach exposes student...

Malware Campaign Using Fake Charities Targets Ukraine’s Defense Forces

What happened A malware campaign using fake charities targets Ukraine’s...

Windows Secure Boot Certificates Near Expiration, Risking Boot Failures Without Updates

What happened Windows Secure Boot certificates near expiration, risking boot...

Share

What happened

Windows Secure Boot certificates near expiration, risking boot failures without updates as key certificates stored in the UEFI Key Enrollment Keys (KEK) and Secure Boot databases (DB) are set to expire mid‑2026, which could interrupt the trust chain used by Windows Boot Manager and third‑party loaders if devices have not received updated certificates. The issue stems from original Microsoft Secure Boot certificates issued in 2011 reaching end‑of‑life, and affected systems will require updated certificates stored in KEK and DB to ensure continued validation of early‑boot firmware and prevent potential Secure Boot failures. Although no widespread exploitation has been reported, the technical risk is that systems may reject future signed boot components or fail to apply security updates related to boot integrity unless firmware, OS updates, and certificate revocation lists are current. 

Who is affected

Users and enterprises managing fleets of Windows devices, including desktops, servers, and virtual machines that depend on Secure Boot for early‑loader validation, are potentially affected if firmware and OS patches delivering new Secure Boot certificates are not applied before expiration. 

Why CISOs should care

Expired Secure Boot certificates can weaken the UEFI trust chain, jeopardize protections against unauthorized early‑boot code execution, and hinder deployment of future secure updates or platform hardening, especially in regulated or high‑security environments. 

3 practical actions

  • Verify certificate updates: Confirm devices have received updated Secure Boot certificates via OS or OEM firmware updates.
  • Audit firmware and OS patching: Ensure both firmware and Windows updates are prioritized in endpoint patch management.
  • Test boot paths: Validate Secure Boot functionality in test environments before broader rollout to detect failures early.