Technology4 min read

Windows' Original Secure Boot Certificates Expire in June—Here's What You Need to Do

Written by ReDataFebruary 11, 2026
Windows' Original Secure Boot Certificates Expire in June—Here's What You Need to Do

The boot security of Windows systems faces a crucial milestone this summer. Microsoft has announced that the original Platform Key (PK) certificates used for Secure Boot, a fundamental technology that protects the operating system startup process, will expire on June 24, 2024. This event, although planned since the feature's initial implementation, requires attention from users and system administrators to ensure a smooth transition and maintain the security integrity of their devices.

Secure Boot is an industry-standard security feature, defined as part of the UEFI (Unified Extensible Firmware Interface) specification, which replaced the legacy BIOS. Its primary purpose is to prevent malicious software, such as rootkits or bootkits, from loading during the system boot process. It does this by verifying the digital signature of each software component—from the firmware to the operating system bootloader—against a database of trusted certificates stored in the device's firmware. PK certificates are the cornerstone of this chain of trust; they are the highest-level root certificates that sign the platform keys, authorizing which firmware and operating systems can run.

The certificates set to expire were issued by Microsoft Corporation in 2012, with an initial validity of ten years, which was later extended. They have been the trust foundation for millions of devices running Windows 8, 8.1, 10, and 11, as well as for some Linux distributions that opted to use these keys for their secure boot. Expiration is a normal process in the lifecycle management of public security certificates and is designed to encourage key rotation and the adoption of more modern cryptographic algorithms. Microsoft has already issued new PK certificates, signed with the more robust RSA-3072 cryptographic algorithm, which are being distributed through firmware (UEFI) updates from hardware manufacturers and via Windows cumulative updates.

For the vast majority of users, this process will be transparent and automatic. "Devices that have received firmware updates from their manufacturer (OEM) that include the new certificates, or that have installed the latest Windows updates, should transition without user intervention," explained a Microsoft spokesperson in a technical statement. However, there is a potential scenario for issues. Devices that have not been updated and that attempt to boot from old installation or recovery media (such as a Windows installation USB created before 2023) that are signed only with the old certificates might encounter a Secure Boot error when booting after June 24. The system could reject the media deeming its signature expired.

The primary recommendation for users is simple: keep your systems updated. This involves installing the latest Windows updates via Windows Update, which already include patches to handle the transition, and checking for available firmware/BIOS updates on your PC or motherboard manufacturer's website. For IT administrators managing fleets of devices, it is crucial to test the boot process with updated recovery media in a controlled environment before the deadline. Users of Linux distributions that rely on these Microsoft certificates should check with their respective communities for instructions on ensuring their secure boot continues to function.

The impact of inaction is limited but potentially annoying. Already running systems are not expected to suddenly fail to boot, as the installed operating system and its bootloader have already been validated and cached. The main risk centers on recovery, reinstallation, or dual-boot scenarios using old media. In the longer term, this renewal strengthens the Secure Boot ecosystem by introducing stronger cryptographic keys, aligning with current security standards. In conclusion, while the expiration of the Secure Boot PK certificates is a significant technical event, a proactive stance of basic system maintenance—staying current with updates—is sufficient for most to navigate this change seamlessly, ensuring the critical security barrier that is Secure Boot remains intact and effective.

Seguridad InformáticaMicrosoft WindowsActualizaciones de SoftwareTechnologyUEFI Secure BootAdministración de Sistemas

Read in other languages