Automatically checks, downloads, and installs Windows Secure Boot certificate updates, ensuring your system continues to function correctly after the certificate expiration in June 2026.
- Quick Start
- Why Update?
- Supported Systems
- Key Features
- Installation
- KB Update Information
- LTSC Version Support
- Non-ESU User Guide
- Technical Principles of Non-ESU Mode
- Verifying the Update
- Enterprise Deployment
- FAQ
- 🚨 Emergency Rescue (Post-June 2026)
- BIOS Legacy Mode Users (Post-June 2026)
- References
One-Click Execution (Recommended)
Double-click RunMe.bat
- ✅ Easiest method! Just double-click.
- ✅ Automatically requests administrator privileges.
- ✅ Automatically bypasses execution policies.
Process Flow:
- Automatically requests administrator privileges.
- Checks certificate status.
- Downloads and installs updates.
- Deploys new certificates to the Secure Boot DB.
- Prompts for reboot (two reboots required).
- ✅ Windows 10 (22H2/21H2/LTSC 2021)
- ✅ Windows 11 (All versions)
- ✅ Windows Server 2016/2019/2022/2025
⚠️ Administrator privileges required⚠️ Internet connection required
| Expiring Certificate | Expiration Date | New Certificate | Storage Location | Purpose |
|---|---|---|---|---|
| Microsoft Corporation KEK CA 2011 | June 2026 | Microsoft Corporation KEK 2K CA 2023 | Stored in KEK | Signing updates for DB and DBX. |
| Microsoft Windows Production PCA 2011 | October 2026 | Windows UEFI CA 2023 | Stored in DB | Signing the Windows bootloader. |
| Microsoft UEFI CA 2011 | June 2026 | Microsoft UEFI CA 2023 | Stored in DB | Signing 3rd-party bootloaders and EFI apps. |
| Microsoft UEFI CA 2011 | June 2026 | Microsoft Option ROM UEFI CA 2023 | Stored in DB | Signing 3rd-party Option ROMs. |
- ❌ Computer may NEVER boot into Windows 10/11 again (Secure Boot failure prevents startup).
- ❌ System completely unable to install ANY security updates.
- ❌ All new software and drivers will be unusable.
- ❌ Computer exposed to EXTREME security risks (cannot patch vulnerabilities).
⚠️ Risk increases drastically after June 2026.
| Version | Support Status | KB5073724 | ESU Required | End of Support |
|---|---|---|---|---|
| 22H2 | ✅ Fully Supported | ✅ | ✅ ESU (Extended to 2026-10) | 2025-10-14 (Expired) |
| 21H2 | ✅ Fully Supported | ✅ | ❌ Not Supported | 2024-06-11 (Expired) |
| Enterprise LTSC 2021 | ✅ Fully Supported | ✅ | ✅ Mandatory | 2027-01-12 |
| IoT Enterprise LTSC 2021 | ✅ Fully Supported | ✅ | ✅ Mandatory | 2032-01-13 |
| Version | Support Status | Auto Deployment |
|---|---|---|
| 25H2 | ✅ Fully Supported | ✅ From 2026-01 |
| 24H2 | ✅ Fully Supported | ✅ From 2026-01 |
| 23H2 | ✅ Fully Supported | |
| 22H2 | ✅ Fully Supported |
- Secure Boot Status Check: Detects if Secure Boot is enabled.
- BIOS Certificate Read: Directly reads certificate info from BIOS/UEFI.
- Expiration Warning: Clearly marks certificate status with Red/Yellow/Green colors.
- Old 2011 Certificate Check: Identifies expiring certificates.
- Non-ESU Auto-Support: Automatically downloads updates via Microsoft Update Catalog.
- Smart Skip: Automatically skips download if the target certificate already exists.
- Windows 10: Automatically installs KB5073724.
- Windows 11: Uses monthly updates.
- Auto Registry Configuration: Sets
AvailableUpdates. - New Certificate Deployment: Writes Windows UEFI CA 2023 to Secure Boot DB.
- Deployment Verification: Confirms write success.
- Reboot Management: Prompts for the required two reboots.
- Auto-Fetch: Scrapes Microsoft Update Catalog page.
- Auto-Parse: Extracts update GUID and download links.
- Auto-Download: Downloads .cab files.
- Auto-Install: Uses DISM command.
- Smart Architecture Detection: (x64/x86/ARM64).
- No Manual Operation Needed - Completely automated!
- Colored output, clear and readable.
- Detailed status reports.
- Automatic administrator privilege elevation.
- Clear reboot prompts (twice).
# Run the script (automatically calls PowerShell)
Double-click RunMe.bat
# The script automatically handles:
# - Checking and installing KB5073724 (Windows 10)
# - Checking monthly updates (Windows 11)
# - Deploying UEFI CA 2023
# - Verifying certificatesThis tool has built-in automatic downloading from the Microsoft Update Catalog. However, if network issues cause failure, you can perform it manually:
- Automatically opens Microsoft Update Catalog.
- Select the version matching your system architecture.
- Download the
.msufile. - Double-click to install.
- Return to the script to continue.
Using WSUS, Intune, or SCCM:
# WSUS: Configure Product and Classification
Product: Windows 10, version 1903 and later
Classification: Security Updates
# Intune: Use Windows Update for Business
# SCCM: Create Software Update Deployment- Release Date: January 13, 2026
- Build Versions:
- 19045.6809 (Windows 10 22H2)
- 19044.6809 (Windows 10 21H2 / LTSC 2021)
- Features: Includes new Secure Boot certificates (2023 version).
- Download: Microsoft Update Catalog
Applicable Versions:
- Windows 10 Version 22H2 (All editions)
- Windows 10 Version 21H2 (All editions)
- Windows 10 Enterprise LTSC 2021 (Requires ESU)
- Windows 10 IoT Enterprise LTSC 2021 (Requires ESU)
Special Notes:
- Includes phased Secure Boot certificate deployment.
- Only devices showing sufficient success signals will receive the new certificate automatically.
- Removes old modem drivers (agrsm64.sys, agrsm.sys, smserl64.sys, smserial.sys).
- Release Date: February 13, 2024
- Applicable Systems: Windows 10/11 (All editions)
- Function: Deploys Windows UEFI CA 2023 certificate to Secure Boot DB.
- Deployment Method:
# 1. Set Registry
Set-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Control\SecureBoot" -Name "AvailableUpdates" -Value 0x40
# 2. Start Scheduled Task
Start-ScheduledTask -TaskName "\Microsoft\Windows\PI\Secure-Boot-Update"
# 3. Reboot Twice
# 4. Verify
[System.Text.Encoding]::ASCII.GetString((Get-SecureBootUEFI db).bytes) -match 'Windows UEFI CA 2023'
# Should return TrueDepending on your situation, you may need:
- KB5031539: For offline images (2023-10-13)
- KB5005260: For WSUS/Standalone packages (2021-08-10)
✅ KB5073724 fully supports Windows 10 LTSC 21H2, including:
- Windows 10 Enterprise LTSC 2021 (21H2) - Build 19044.6809
- Windows 10 IoT Enterprise LTSC 2021 (21H2) - Build 19044.6809
| Version | End of Support | Notes |
|---|---|---|
| Enterprise LTSC 2021 | 2027-01-12 | Requires ESU |
| IoT Enterprise LTSC 2021 | 2032-01-13 | Longer support |
ESU Registration:
- Via Microsoft 365 Admin Center
- Via Volume Licensing Service Center (VLSC)
- Contact a Microsoft Authorized Reseller
# 1. Ensure ESU program enrollment
# 2. Run the update tool
Double-click RunMe.bat
# The tool automatically:
# - Detects LTSC version
# - Searches and downloads KB5073724
# - Installs updates
# - Deploys UEFI CA 2023
# - Prompts for two reboots⚠️ KB5073724 is primarily for ESU Users.⚠️ Non-ESU systems cannot receive it via Windows Update.- ✅ Can be downloaded from Microsoft Update Catalog and installed automatically by this tool.
⚠️ Note: Without ESU, the KB installation might act as if "removed" (Rollback) upon reboot. This is normal.- ✅ Solution: This tool's Step 3 (Registry Method) works independently of the KB, forcing the Secure Boot DB update.
When running the tool:
- The tool attempts to automatically download and install KB5073724.
- If you lack ESU, installation may appear successful but be removed after reboot.
- DO NOT WORRY! Please run this tool AGAIN after reboot.
- The tool will detect the KB is missing but proceed to execute Step 3.
- Step 3 forces the Secure Boot DB update via registry.
If the standalone installer doesn't work:
- Upgrade to Windows 11: Free and continuous updates.
- Get ESU (Extended Support): Extend Windows 10 support.
- Free Plan: Windows 10 users can register for the Consumer ESU program by simply logging in with a Microsoft ID, granting one year of free extended Windows updates (until 2026/10/13). (Official Page)
- Wait: Microsoft might release a non-ESU version before certificate expiration (unless they're feeling generous!).
- Manual Certificate Deployment: Download certificate files from Microsoft GitHub and install manually.
# Method 1: Via PowerShell
Set-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Control\SecureBoot" -Name "AvailableUpdates" -Value 0x40
Start-ScheduledTask -TaskName "\Microsoft\Windows\PI\Secure-Boot-Update"
# Reboot twice
# Method 2: Via BIOS
# 1. Download .bin certificate file from GitHub
# 2. Reboot into BIOS/UEFI settings
# 3. Find Secure Boot settings
# 4. Import the new certificate fileThis program can install UEFI CA 2023 for you even WITHOUT an ESU subscription, solving all the aforementioned problems!
You might ask: "Microsoft says three certificates are expiring (KEK, UEFI CA, PCA), why focus only on UEFI CA 2023?"
Secure Boot doesn't check if the driver itself is expired, but checks "who signed it".
- Current Situation: Drivers are signed by Microsoft with old keys; your BIOS trusts old keys via
UEFI CA 2011. - After 2026: New hardware drivers and software will be signed with New Keys, originating from "Windows UEFI CA 2023".
By adding "Windows UEFI CA 2023" to the BIOS Allowlist (DB): Any driver or system update tracing back to this new source will be considered safe and allowed to load.
| Issue (Certificate Expiry) | Solution (Tool Step 3) | Result |
|---|---|---|
| Microsoft Corporation KEK CA 2011 (Database update failure) |
Force Key Rotation The registry command triggers BIOS to update the entire trust list. |
✅ Restores database update capability ✅ KEK and DB updated in sync |
| Microsoft UEFI CA 2011 (Cannot boot new 3rd-party OS/drivers) |
Deploy CA 2023 Adds new root of trust to DB. |
✅ Allows loading new drivers ✅ Supports new Linux/Windows Bootloaders |
| Microsoft Windows Production PCA 2011 (Cannot install Windows updates) |
Deploy CA 2023 Windows update packages use new signatures. |
✅ Allows update installation ✅ System kernel verification passes |
Step 3 (Registry Method) of this tool executes:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecureBoot\AvailableUpdates = 0x40
This is not a "hack", but invokes Microsoft's official Keys Update mechanism. Even without installing KB5073724, as long as the system has this update mechanism built-in (most Windows 10/11 versions do), this command forces the BIOS to read and write new certificate data.
Conclusion: As long as the script finally shows a Green OK (UEFI CA 2023 is in DB), your system is immune to the 2026 cliff, regardless of whether the KB installation was rolled back.
Get-HotFix -Id "KB5073724"Get-ChildItem Cert:\LocalMachine\Root | Where-Object { $_.Subject -match "2023" }[System.Text.Encoding]::ASCII.GetString((Get-SecureBootUEFI db).bytes) -match 'Windows UEFI CA 2023'
# Should return True# Windows 10 22H2 should be 19045.6809
# Windows 10 21H2 should be 19044.6809
Get-ItemProperty "HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion" | Select-Object CurrentBuildNumber, UBR-
Test Environment Verification
- Deploy in test environment first.
- Verify compatibility of all critical applications.
- Confirm hardware (especially modem) compatibility.
-
Check OEM Firmware Updates
- Microsoft recommends installing OEM (Dell, HP, Lenovo) firmware updates first.
- Firmware updates are foundational for correct Secure Boot updates.
# Configure Product and Classification
Product: Windows 10, version 1903 and later
Classification: Security Updates
# KB5073724 will sync automatically# Create Windows Update for Business policy
# Configure Update Rings:
# - Test Ring (10% devices)
# - Production Ring (90% devices)# Force Deploy UEFI CA 2023
Set-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Control\SecureBoot" -Name "AvailableUpdatesPolicy" -Value 0x5944- Week 1: Deploy to 10% pilot machines.
- Week 2: Monitor and resolve issues.
- Weeks 3-4: Expand to 50%.
- Weeks 5-6: Complete remaining 50%.
# Check deployment status
Get-HotFix -Id "KB5073724" -ComputerName (Get-ADComputer -Filter *).Name
# Check certificate status
Invoke-Command -ComputerName (Get-ADComputer -Filter *).Name -ScriptBlock {
[System.Text.Encoding]::ASCII.GetString((Get-SecureBootUEFI db).bytes) -match 'Windows UEFI CA 2023'
}A: Please confirm:
- Joined ESU program (Mandatory for LTSC, recommended for general Win10).
- ESU license properly activated.
- Windows Update service running normally.
- If still missing, use the Microsoft Update Catalog option in this tool to download manually.
A: Two reboots are required:
- First Reboot: Download and install Windows updates.
- Second Reboot: Complete Secure Boot DB update.
A: KB5073724 removes old modem drivers. If you still need them:
- Contact hardware manufacturer for updated drivers.
- Consider upgrading hardware.
- If old hardware is mandatory, you might need to delay this update (not recommended).
A: KB5073724 is primarily for LTSC 2021 (21H2). Earlier LTSC versions may have different update packages; please check Microsoft documentation.
A: If not installed:
- After June 2026, Secure Boot might fail.
- Cannot install new security updates.
- Cannot use newly signed software and drivers.
- System security compromised.
A: Yes, but note:
- VM needs UEFI and Secure Boot enabled.
- Some virtualization platforms might not fully support Secure Boot DB updates.
- Recommend testing on physical machine before deploying to virtual environment.
A: If update fails:
- Check Windows Update logs.
- Ensure latest Servicing Stack Update (SSU) is installed.
- Try manual download from Microsoft Update Catalog.
- Contact Microsoft support.
If you are seeing this after June 2026 and your computer is locked out of Windows by Secure Boot, DO NOT PANIC! Follow these steps to rescue your system.
This is the simplest method, requiring only BIOS setting changes.
- Enter BIOS/UEFI Settings: Press
Del,F2, orF10(depends on manufacturer) continuously during boot. - Find Secure Boot Option: Usually under
SecurityorBoottab. - Set Secure Boot to
Disabled. - Save and Restart (
F10): You should now be able to boot into Windows normally. - Run This Tool:
- Run
RunMe.bat(orUpdate-SecureBootCert.ps1) as administrator. - Select
Yto start update. - Wait for the script to complete Step 3 (Deploy Certificates).
- Run
- Re-enable Secure Boot:
- Restart computer, enter BIOS again.
- Set Secure Boot back to
Enabled. - Save and Restart.
- Congratulations! Your computer now has the new certificates and can operate securely.
If you cannot access Windows or Method A fails, you can import certificates directly via BIOS.
Preparation (Requires another working computer):
- Prepare a FAT32 formatted USB drive.
- Download Microsoft official certificate file (
.binformat):- Windows UEFI CA 2023 Certificate (GitHub)
- This link leads to Microsoft's official GitHub repo.
- Copy the
.binfile to the root of the USB drive.
Rescue Steps:
- Plug USB into the faulty computer.
- Boot into BIOS Setup Menu.
- Go to Secure Boot settings page.
- Look for Key Management or Custom Mode.
- Select "Enroll Key" or "Append to DB".
- Note: Select DB (Authorized Signatures). NEVER touch PK or KEK unless you know exactly what you are doing.
- Select
No filesystemor your USB device. - Select the
.binfile you just copied. - Confirm import (Might show "Success").
- Save BIOS settings and restart.
If you currently boot using the old Legacy BIOS (CSM) mode instead of UEFI, please note:
- Since Legacy mode doesn't use Secure Boot, you will NOT be locked out of boot (BIOS doesn't check DB).
- HOWEVER, the Windows OS kernel still verifies driver signatures. If your Windows 10 lacks this update, future installation or loading of new hardware drivers signed with new certificates may fail (e.g., installing new NVIDIA drivers might be blocked).
- Recommendation: Still execute this tool to ensure OS-level compatibility.
- Windows 11 mandates UEFI + Secure Boot.
- If you decide to switch from Legacy to UEFI and reinstall Windows 11 after June 2026:
- Your old BIOS (with outdated DB) will refuse to boot the new Windows 11 installation media (as it's signed with new certificates).
- Solution:
- Refer to Emergency Rescue Method A above.
- Specifically: Turn off Secure Boot to install -> Enter Windows and run this tool -> Turn Secure Boot back on.
- Windows Secure Boot Certificate Expiration and CA Update
- KB5073724 Official Page
- KB5036210 - UEFI CA 2023 Deployment
- Windows 10 LTSC Lifecycle
- ESU Program Information
Last Updated: 2026-01-26
Version: 1.0
Author: anomixer