Description

Windows Secure Boot stores Microsoft certificates in the UEFI KEK and DB. These original certificates are approaching expiration, and devices containing affected certificate versions must update them to maintain Secure Boot functionality and avoid compromising security by losing security fixes related to Windows boot manager or Secure Boot. The operating system’s certificate update protection mechanism relies on firmware components that might contain defects, which can cause certificate trust updates to fail or behave unpredictably. This leads to potential disruption of the Secure Boot trust chain and requires careful validation and deployment to restore intended security guarantees. Certificate Authority (CA) Location Purpose Expiration Date Microsoft Corporation KEK CA 2011 KEK Signs updates to the DB and DBX 06/24/2026 Microsoft Corporation UEFI CA 2011 DB Signs 3rd party boot loaders, Option ROMs, etc. 06/27/2026 Microsoft Windows Production PCA 2011 DB Signs the Windows Boot Manager 10/19/2026 For more information see this CVE and Windows Secure Boot certificate expiration and CA updates.

INFO

Published Date :

2026-01-13T17:56:04.224Z

Last Modified :

2026-04-01T13:48:13.618Z

Source :

microsoft
AFFECTED PRODUCTS

The following products are affected by CVE-2026-21265 vulnerability.

Vendors Products
Microsoft
  • Windows 10 1607
  • Windows 10 1809
  • Windows 10 21h2
  • Windows 10 21h2
  • Windows 10 22h2
  • Windows 10 22h2
  • Windows 11 23h2
  • Windows 11 23h2
  • Windows 11 24h2
  • Windows 11 24h2
  • Windows 11 25h2
  • Windows 11 25h2
  • Windows Server 2012
  • Windows Server 2012 R2
  • Windows Server 2016
  • Windows Server 2019
  • Windows Server 2022
  • Windows Server 2022 23h2
  • Windows Server 2025
  • Windows Server 23h2
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2026-21265.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact