Windows can apply the updated Secure Boot certificates to existing firmware without requiring a BIOS/firmware update, as long as the device can boot Windows and install updates.
Key points from the documented behavior:
- Expired or missing certificates can still be updated from Windows
Even if the existing Secure Boot certificates are expired or not yet applied, the cumulative updates that contain the new 2023 Secure Boot certificates can still be installed, and Windows can write the updated certificates into firmware by following the published deployment guidance. This applies to devices that can boot Windows and install updates. - Do not disable Secure Boot or rely on firmware reset as the primary method
Disabling Secure Boot or randomly changing firmware options is not recommended. Disabling Secure Boot significantly reduces protection and is not the supported workaround for certificate expiration or update issues. - How to check if the 2023 certificates are already applied
Use the documented registry-based status check:
If the status shows(Get-ItemProperty 'HKLM:\SYSTEM\CurrentControlSet\Control\SecureBoot\Servicing' -Name 'UEFICA2023Status').UEFICA2023StatusUpdated, no further action is needed. - How to force/apply the updated certificates from Windows (no BIOS menu required)
The supported way to push the new certificates into the Secure Boot DB from Windows is:- Make sure the latest cumulative update that includes the Secure Boot changes is installed (for example, the July 8, 2025 servicing update or later, as required by the mitigation guidance).
- From an elevated Command Prompt, set the registry flag and trigger the Secure Boot update task:
reg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Secureboot /v AvailableUpdates /t REG_DWORD /d 0x40 /f Start-ScheduledTask -TaskName "\Microsoft\Windows\PI\Secure-Boot-Update" - If Virtual Secure Mode features (Credential Guard, Device Guard, Windows Hello, etc.) are enabled, a restart may be required.
- After the task runs and the system has restarted (twice is recommended in the Secure Boot servicing guidance), verify that the DB has been updated by running this PowerShell command as Administrator:
If it returns[System.Text.Encoding]::ASCII.GetString((Get-SecureBootUEFI db).bytes) -match 'Windows UEFI CA 2023'True, the updated 2023 certificate is present in the Secure Boot DB and the update was successful.
- If Windows reports that certificates are updated but not applied to firmware
When Event Viewer shows that Secure Boot certificates have been updated but are not yet applied to firmware, Windows will continue to attempt to apply them on subsequent restarts. If the firmware returns an error during DB/DBX/KEK update, an error event (such as Event ID 1795 or 1801 fromTPM-WMI) is logged. In that case:- Windows will retry on the next restart.
- If errors persist, the guidance is to contact the device manufacturer to see if a firmware update is available. However, even without a new BIOS, as long as the firmware supports Secure Boot variable updates, the Windows-side process above is the correct method.
- Virtual machines and similar environments
For completeness: in virtualized environments, either the platform provider updates the virtual firmware, or Windows applies the certificates through the same Secure Boot update mechanism, if the virtual firmware supports it. - Impact if certificates remain unapplied
If the device reaches certificate expiration without the new certificates applied, it will still boot and operate normally, and standard Windows updates will continue to install. However, new Secure Boot and Boot Manager protections, early-boot vulnerability fixes, and some third‑party components that rely on updated Secure Boot trust will not be available, so protection is reduced over time.
In summary, the supported way to “force” application of the updated Secure Boot certificates without entering firmware setup is to:
- Ensure the latest cumulative updates are installed.
- Use the documented registry flag and
Secure-Boot-Updatescheduled task from an elevated session. - Reboot (twice if needed) and verify with
Get-SecureBootUEFI dbthatWindows UEFI CA 2023is present.
No manual BIOS key reset is required for this process, and Secure Boot should not be disabled.
References:
- When Secure Boot certificates expire on Windows devices
- Frequently asked questions about the Secure Boot update process
- How to manage the Windows Boot Manager revocations for Secure Boot changes associated with CVE-2023-24932
- Windows Configuration System (WinCS) APIs for Secure Boot
- Enterprise Deployment Guidance for CVE-2023-24932
- Secure Boot DB and DBX variable update events
- Secure Boot certificates have been updated but are not yet applied - Microsoft Q&A