Skip to main content
Security 2 min read 420 views

Secure Boot Certificates from 2011 Begin Expiring in June 2026: What IT Teams Must Do Now

The original Secure Boot certificates installed on Windows PCs since 2011 will start expiring in June 2026, and without action devices will lose the ability to receive boot-component security updates and trust newly signed third-party software.

TD

TechDrop Editorial

Share:

Microsoft has issued an urgent warning to IT administrators: the Microsoft Windows Production PCA 2011, Microsoft Corporation KEK CA 2011, and Microsoft Corporation UEFI CA 2011 certificates — which underpin Secure Boot on virtually every Windows PC and server shipped over the past 15 years — will begin expiring in June 2026 and complete their expiration cycle by October 2026. Organizations that do not update these certificates beforehand face serious consequences to boot security and compliance.

What Happens If You Do Nothing

After a 2011 certificate expires, affected devices will be unable to install Secure Boot security updates and will not trust third-party UEFI drivers or boot loaders signed under the old chain. Boot-component security updates — including defenses against UEFI bootkits like BlackLotus (CVE-2023-24932) — will no longer be applicable, leaving systems permanently exposed to that class of threat. For enterprise environments, expired Secure Boot certificates will also trigger compliance failures in frameworks that mandate verified boot.

The Replacement Path

Microsoft began rolling out replacement 2023 CA certificates through monthly Windows Update. Organizations need to install the 2023 CAs before the 2011 CAs start expiring. On managed endpoints, this means verifying that the February 2026 or later cumulative update has been applied and that the new certificate bundle has been enrolled in the UEFI Secure Boot database.

Virtual machines present an additional challenge: VM templates and offline snapshots created from pre-update images will carry the old certificates and must be refreshed. Administrators managing fleets of VMs on VMware, Hyper-V, or other hypervisors should audit template libraries now.

Recommended Timeline

Microsoft has published a detailed Secure Boot Playbook on the Windows IT Pro Blog with step-by-step guidance. The key milestones are: validate current certificate status on representative devices in each hardware class, deploy cumulative updates that include the 2023 CA bundle to all endpoints, update PXE boot environments and WinPE images, and complete the rollout with at least 30 days of buffer before June 2026. Organizations with large, complex estates should begin this work immediately.

Related Articles