Do you have Secure Boot enabled on your Windows 10/11 PC?
In fact, some of the certificates currently used on many PCs will begin to expire in 2026. This issue, also known by some as the "2026 problem," is an important security update that affects the startup of PCs.
In this article, we will explain in an easy-to-understand manner, even for beginners, the overview of the "2026 problem" and how to check whether your PC has already been prepared for it.
Basic premise: Check if Secure Boot is enabled
All of the methods introduced in this article assume that Secure Boot is enabled on your PC.
If Secure Boot is disabled, the certificate check itself will be meaningless, so first check the current status using the following steps.
Verification Procedure
1. Press Windows key + R to open Run, type "msinfo32" and press Enter.
2. System Information will open, so look for Secure Boot Status in the items on the right.
- If "enabled": No problem, just keep reading.
- If "Disabled"First, you need to reboot your PC and enable Secure Boot in the UEFI/BIOS settings. To enable it, please refer to the other article in this blog (or the method explained in Part 1).
Steps to enable Secure Boot:
- Restart your PC and during startup
DeleteKeys andF2Press the key repeatedly to enter the BIOS/UEFI settings screen. - Find the item "CSM (Compatibility Support Module)" in the settings and set it to "Disabled."
- Next, change the "BIOS Mode" to "UEFI" in the "Boot" menu (some motherboards automatically go into UEFI only mode when you disable CSM).
- Finally, find "Secure Boot" in the "Security" menu and set it to "Enabled."
- Save the settings and reboot.
Some PCs require you to install Secure Boot keys:
Some PCs may not have the Secure Boot key installed. To enable Secure Boot, you must install the Secure Boot key. Please refer to the instructions below to install it.
If you select "Install Default Secure Boot keys" and press "YES", the correct factory keys (PK, KEK, db, dbx) will be installed, your PC will enter secure "User Mode" and Secure Boot will be automatically enabled.
The following image shows the state when the Secure Boot key is not installed. *This is the BIOS (UEFI) screen for the author's PC motherboard model: B550M-P4.
Once the Secure Boot keys are installed, the correct factory default keys (PK, KEK, db, dbx) will be displayed (in the red box at the bottom left of the image).
Platform Key (PK)
- This is PK .
- The master key for the entire Secure Boot.
Key Exchange Keys
- This is KEK (Key Exchange Key).
- db と dbx A list of keys that have permission to update.
Authorized Signatures
- This is db (Signature Database).
- " which has registered the signatures of OS and drivers that are allowed to startAllowlist".
Forbidden Signatures
- This is dbx (database forbidden executable).
- A signature that prohibits the launch of software that has been found to have vulnerabilities is registered.Banned List".
*Some manufacturers' PCs may have another key unique to the manufacturer. For example,
Authorized TimeStamps
- This means DBT .
- Simply put, it is a "certificate list of trusted Time Stamping Authority (TSA)" and is a "dated stamp" from a notary public that certifies when the signature was written.
In my environment, after updating to the BIOS (version 3.90) released on 2025/10/09, the item was added. (However, this key was empty.)
Why is certificate verification necessary now? – Secure Boot’s “2026 problem”
- OverviewThe Secure Boot certificates (2011 version) currently used on many PCs will begin to expire one after another starting in 2026.
- riskIf left unaddressed, the OS may not start up or security updates may not be applied in the future.
- Solutions: This issue is resolved by adding the new "2023 edition" certificate to your PC.
- Supplemental: This measure is usually implemented automatically through Windows Update, but in this article we will show you how to check for yourself whether it has been applied.
This article explains in detail how this certificate update may affect your PC and explains two important steps you should take now to protect yourself from the risks.
The following article provides more information about Event ID 1801 (Secure Boot CA/Key Notification) and explains how to manually renew the Secure Boot certificate.
What causes "Error 1801 (TPM-WMI)" to be logged in the Event Viewer and how to fix it from Microsoft
Method 1: Check the certificate version using PowerShell commands
This is a method to directly read the certificate information registered in UEFI using PowerShell, which is standard on Windows.
procedure:
1.Start buttonRight-click on the icon and click "Terminal (Administrator)" or "Windows Powershell (Administrator)."
2. Type the following command and press Enter:
[System.Text.Encoding]::ASCII.GetString((Get-SecureBootUEFI db).bytes)
How to interpret the results:
Most of the text will appear garbled, but this is normal.
The garbled text contains "Windows UEFI CA"Or"Microsoft UEFI CA" followed by "2023If you see the message ", the new certificate has been installed.
*The old certificate "2011" remains to maintain compatibility and is not a problem.
In the case of Windows 11, in many environments, "U”Microsoft Corporation UEFI CA 20110?”0"Or"U%Microsoft Windows Production PCA 20110?”0" I think you will find it.
Method 2: One-click verification with Windows Secure Boot Certificate Checker
For those who find command operations a little difficult, we have created a tool called the "Windows Secure Boot Certificate Checker" that allows you to easily perform this verification process with just one click.
However, depending on your PC environment, it may not work properly, so please use it only as a quick and easy way to check.
How to download the tool:
Update history:
2025/10/11 Ver 1.0.0.1:The fix was to obtain only the following four certificates:
- "Microsoft UEFI CA" (Signs third-party boot loaders and EFI applications.)
- "Microsoft Corporation UEFI CA" (This is the old name, same as above.)
- "Microsoft Corporation KEK 2K CA" (signs DB and DBX updates)
- "Windows UEFI CA" (used to sign the Windows boot loader)
*October 15, 2025: ESET security software may mistakenly detect the object as suspicious.
2025/11/04 Ver 1.0.0.2:Added the following certificate acquisition. The results are now easier to view.
- "Microsoft Option ROM UEFI CA 2023" (Signs third-party option ROMs.)
2026/02/03 Ver 1.0.0.3:
- UI Adjustments: The screen layout has been partially changed, including the addition of a menu bar.
- Internal processing fixes: The internal processing of the program has been revised to improve stability.
2026/02/04 Ver 2.0.0.0:
- New features: A function has been implemented to check whether the boot manager (bootmgfw.efi) is signed with the 2023 version (new certificate).
- UI revamp: The screen design has been updated to dark mode, and the font has been changed to Meiryo UI and MS Gothic to improve visibility.
- Internal processing fixes: Added EFI partition access processing and improved the accuracy of the detection logic.
2026/02/06 Ver 2.1.0.0:
- Decision logic bug fixes: We have fixed a bug that, in some environments, would cause the number "2023" in the display of an older version to be incorrectly detected and incorrectly determined to be "updated."
- Improved results display: The results are now separated into two sections: "Boot Manager" and "Windows UEFI CA 2023 (Certificate)," and the status of each section is now displayed in a different color.
- Tighter criteria: We have changed the system so that it is determined to be "compatible" only if "Windows UEFI CA 2023", which is required for Windows boot, is present in the database. (If only KEK or Microsoft UEFI CA 2023 is present, it will be determined to be "non-compatible.")
- Status wording changes: To convey the current status more intuitively, the judgment message has been changed to "New Boot Manager Compatible/Not Compatible."
2026/02/14 Ver 2.2.0.0:
[Major changes]
- Fully supports multilingual UI (Japanese and English) The app now automatically detects the OS language settings and displays the English UI by default when launched in a non-Japanese environment (such as an English OS). This means that overseas users can use the app without any settings.
- Added manual language switching function A new "Options" has been added to the menu bar, allowing you to seamlessly switch between Japanese and English with one click, even after launching.
- Layout optimization for overseas markets The monospaced font and text placement in the console area have been fine-tuned to match global specifications so that text does not get cut off even when displayed in English.
Target file: "SBCertificateChecker.exe" (Ver 1.0.0.0)
ハ/ッシュ値(SHA256):45541771c5cdd48bc6c898a082725fdf2fa609d2e2845c630682cc908302093c
Target file: "SBCertificateChecker.exe" (Ver 1.0.0.1)
ハッシュ値(SHA256):53e85b24326d4b4207e1425c97f2773a4cb9bae17bec865a7b34f57011297bbb
Target file: "SBCertificateChecker.exe" (Ver 1.0.0.2)
ハッシュ値(SHA256):036dd645628bbac3f9ef241345c9b060f2e9e3ca57d130515cd64edbfdbd8938
Target file: "SBCertificateChecker.exe" (Ver 1.0.0.3)
ハッシュ値(SHA256):d400e398d3b331473515ad300e11369bec4c3c5977188ac8c04c6d93f0f230c4
Target file: "SBCertificateChecker.exe" (Ver 2.0.0.0)
ハッシュ値(SHA256):3bfb427208f39c2445be3d22f5aae366a02885176591af194bf62380e25a78b7
Target file: "SBCertificateChecker.exe" (Ver 2.1.0.0)
ハッシュ値(SHA256):fa27e2fabe917c80ecffb1d147d8dbe03ae4978a8447df42387e459051ed95cf
Target file: "SBCertificateChecker.exe" (Ver 2.2.0.0)
ハッシュ値(SHA256):38a14c239d1606282a070c9518aa043ff8da0ce44eeec8a4cf33b09adf79fbec
How to use:
- Extract "SBCertificateChecker.zip" and run "SBCertificateChecker.exe" inside.
- If "User Account Control" appears, click "Yes".
- Click the "Start Checking" button.
- The result will be a list of currently installed certificates and whether they are 2023 versions.
* Version 2.0.0.0 and later include a function to check whether the signature of the boot manager (bootmgfw.efi) is the 2023 version (new certificate).
How do I find out the exact expiration date of a certificate?
You can check the expiration date of the older version (2011) from the following page:
Windows Secure Boot Certificate Expiration and CA Renewal
The expiration date of the new version (2023) can be found in the certificate file (extension The best way to find out is to download the certificate (.cer or .crt) directly and check its properties.
Windows Secure Boot key creation and management guidance
*You cannot view the expiration date directly using commands such as PowerShell.
How to check the expiration date from a certificate:
1. The download URL is displayed under the item "Windows UEFI CA 2023" on the Microsoft page, so click on it to download.
2. Double-click the certificate to open it.
3. The "Opening File - Security Warning" message will appear, so click "Open".
4. The certificate information will then be displayed, so please check the expiration date.
About the "Install Certificate" button:
When you open the certificate, you will see an "Install Certificate" button, which may have caught your attention.
Pressing this button to install will have no effect on the Secure Boot update (a solution to the 2026 problem).
Why no impact? – Two different “certificate stores”
There are two main locations (certificate stores) on a PC where certificates are stored, each with a completely different role.
1. UEFI firmware certificate store (db, dbxSuch)
- role: Turn on your PC,Before Windows startsAt this stage, we verify that the boot loader and other components are safe.
- Place: It is stored in a special memory (NVRAM) on the motherboard.
- example: "Master Key List" held by the building's security officeIf you are not on this list, you will not be able to enter the building in the first place.
2. Windows OS Certificate Store
- role: After Windows startsIn addition, it verifies software signatures, website SSL/TLS certificates, and more.
- Place: It is stored in the Windows system files.
- example: "Business partner list" held by tenants (companies) in the buildingIt is used for internal business after entering the building.
The "Install Certificate" button is the latter Windows OS certificate storeThe operation to add a certificate to.
To continue with the building analogy, it would be like adding a new company to the "client list," but it would have no effect on the "master key list" held by the security office.
So how do you update Secure Boot?:
To update the Secure Boot certificate (the master key list of the security room), it is not an OS-level operation, but a PC foundation. UEFI/BIOS firmwareWe need to work on this.
The two correct ways to do this are as follows:
- Windows Update: Microsoft will prompt you to update the firmware through OS updates.
- UEFI/BIOS updates: Apply firmware updates provided by your PC manufacturer.
Therefore, there is no need to "install" the downloaded certificate yourself, and even if you do install it, it will not solve the Secure Boot problem.
Summary
- Review of key points:
- Secure Boot certificates have an expiration date, and as a measure to address the "2026 problem," they are being updated to new "2023 version" certificates.
- The countermeasure status can be checked using PowerShell or a verification tool.
- In most cases, updates are done automatically, so all users need to do is enable Secure Boot and keep Windows Update up to date.
PC security is an invisible part of the system, but by understanding how it works and checking the status from time to time, you can continue to use your PC with greater peace of mind. I hope this article will help you do just that.
【Related Links】






