Did you manually update your Secure Boot Keys ?


You should running the command from a CMD or Terminal window, as Admin. If you get a path error, add .\Check_EFIBootFile.ps1 to say the script is in the current folder you're in.
 

My Computer

System One

  • OS
    Windows 7
i had to install PowerShell preview on my wife's system to get this secure boot update to install.
as the old PowerShell just wouldn't do the upgrade.
i have no idea why?

best of luck, Steve ..
 

My Computers

System One System Two

  • OS
    Win 11 24H2 Home
    Computer type
    PC/Desktop
    Manufacturer/Model
    HP 24" AiO
    CPU
    Ryzen 7 5825u
    Motherboard
    HP
    Memory
    64GB DDR4 3200
    Graphics Card(s)
    Ryzen 7 5825u
    Sound Card
    RealTek
    Monitor(s) Displays
    24" HP AiO
    Hard Drives
    1TB WD Blue SN580 M2 SSD Partitioned.
    2x 1TB USB HDD External Backup/Storage.
    Internet Speed
    1GB full fibre
    Browser
    Edge & Thunderbird
    Antivirus
    AVG Internet Security
    Other Info
    Mainly Open Source Software
  • Operating System
    Ubuntu 22.04.5 LTS
    Computer type
    Laptop
    Manufacturer/Model
    Dell 13" Latitude 2017
    CPU
    i5 7200u
    Motherboard
    Dell
    Memory
    16GB DDR4
    Graphics card(s)
    Intel
    Sound Card
    Intel
    Monitor(s) Displays
    13" Dell Laptop
    Hard Drives
    250GB Crucial 2.5" SSD
    Mouse
    Gerenic 3 button
    Internet Speed
    WiFi only
    Browser
    FireFox
    Antivirus
    ClamAV TK
    Other Info
    Mainly Open Source Software
I checked my computer by running the check command first. It returned with a "False", so I ran the other two commands and now the Secure Boot keys are updated. I do run Bitlocker and had no problem updating. System restarted normally.
 

My Computers

System One System Two

  • OS
    Windows 11 Pro Version 24H2 OS build 26100.4202
    Computer type
    PC/Desktop
    Manufacturer/Model
    Dell XPS 8960
    CPU
    13th Gen Intel Core i7-13700 2.10 GHz
    Memory
    32 GB
    Graphics Card(s)
    Intel UHD Graphics 770 / NVIDIA GeForce RTX 3060
    Monitor(s) Displays
    Dell S2421H / Dell SE2222H
    Screen Resolution
    1920x1080
    Hard Drives
    C: Crucial CT1000P5PSSD8
    D: Seagate ST2000DM008
    E: Seagate ST4000DX005
    Keyboard
    Logitech K650
    Mouse
    Logitech M650L
    Internet Speed
    200 Mbps
    Browser
    Firefox/Edge
    Antivirus
    Windows Security
  • Operating System
    Windows 11 Pro 23H2 Build 22631.4541
    Computer type
    PC/Desktop
    Manufacturer/Model
    Dell Inspiron 3880
    CPU
    10th Gen Intel(R) Core(TM) i5-10400 CPU @ 2.90GHz
    Memory
    24 GB
    Monitor(s) Displays
    Dell S2421H
    Screen Resolution
    1920x1080
    Hard Drives
    C:\ - Crucial 1 TB NVME SSD
running the script results in:
The argument 'Check_EFIBootFile.ps1' to the -File parameter does not exist. Provide the path to an existing '.ps1' file as an argument to the -File parameter.

And running Check EFIBootFile.ps1 results in a display that disappears too fast to hit Ctrl-A then CTLR-C

Save the .ps1 file to your hard drive in a favorite directory e.g. c:\temp
Run a Powershell as Administrator (or start a command window and use the drop down menu and Ctrl-Click)\ to start an Admin Powershelll window)
At the prompt: c:\> cd c:\temp <enter>
At the Powershell prompt: c:\temp> Unblock-File Check_EFIBootFile.ps1 <enter>
At the Powershell prompt: c:\temp> Check_EFIBootFile.ps1 <enter>

That should get you the output
 

My Computer

System One

  • OS
    Windows 11 Pro 24H2
    Computer type
    Laptop
    Manufacturer/Model
    HP
    CPU
    Intel Ultra 7 155H
    Memory
    16gb
    Graphics Card(s)
    Intel Arc integrated
    Hard Drives
    SSD
The steps to protect W10 systems are identical to W11, the newer boot files are already available from the current Monthly Updates.

Because W10 22H2 will enter End-of-Life for consumer Windows on Oct. 2025, it's not clear whether MS will force an update before then, or expect users to perform the mitigation as a voluntary procedure.

The script posted above will report what certificates are present in the DB (allowed) and DBX (banned) lists.

Ideally, you will have both CA 2011 & CA 2023 as added (both boot files allowed), and DBX may or may not have CA 2011 banned. Not banning CA 2011 doesn't impact Windows, as long as you have both certificates for DB. It just means your system is still vulnerable to an UEFI attack.

@garlin : Here's my output:

EFI DB Certificates ------------------- Microsoft Windows Production PCA 2011 Windows UEFI CA 2023 Microsoft Corporation UEFI CA 2011 Microsoft UEFI CA 2023

So, the fact that they installed in the 2011 certificate before they installed the 2023 certificate means that I'm still vulnerable to the BlackLotus hack around Secure Boot?
 

My Computer

System One

  • OS
    Windows 11 Pro 24H2
    Computer type
    Laptop
    Manufacturer/Model
    HP
    CPU
    Intel Ultra 7 155H
    Memory
    16gb
    Graphics Card(s)
    Intel Arc integrated
    Hard Drives
    SSD
The reported order doesn't matter. When you try booting from a device (HDD, SSD, USB, DVD or PXE), the BIOS examines the signing cert and checks if it's found on the DB list, BUT NOT BANNED on the DBX list. It's not scanned in any particular order, but does the UEFI have a matching cert or not.
 

My Computer

System One

  • OS
    Windows 7
The reported order doesn't matter. When you try booting from a device (HDD, SSD, USB, DVD or PXE), the BIOS examines the signing cert and checks if it's found on the DB list, BUT NOT BANNED on the DBX list. It's not scanned in any particular order, but does the UEFI have a matching cert or not.

But just to clarify for my simple minded brain... if MS (or the hardware manufacturer) has not placed our 2011 certificates in the DBX, and has not removed them from the DB list, Black Lotus can still walk right in, correct?

If true, it seems like MS is only worrying that everyone will be able to boot. But they're not making us more secure. Seems shortsighted on their part since the hacks are already out there.
 

My Computer

System One

  • OS
    Windows 11 Pro 24H2
    Computer type
    Laptop
    Manufacturer/Model
    HP
    CPU
    Intel Ultra 7 155H
    Memory
    16gb
    Graphics Card(s)
    Intel Arc integrated
    Hard Drives
    SSD
Black Lotus can attack any PC which allows the CA 2011 certificate to work. For the most part you don't delete an existing cert from the DB list, you just ban it from the DBX list.

MS thought they were ready to move forward and automatically do this last year, but enough important players out there complained. They've signaled this Fall is the new target date, but it can be delayed until Oct. 2026, when the CA 2011 would have expired ANY WAY.

Which means you need to complete this before Oct. 2026 or none of your PC's will boot (without turning off Secure Boot mode).
 

My Computer

System One

  • OS
    Windows 7
Black Lotus can attack any PC which allows the CA 2011 certificate to work. For the most part you don't delete an existing cert from the DB list, you just ban it from the DBX list.

MS thought they were ready to move forward and automatically do this last year, but enough important players out there complained. They've signaled this Fall is the new target date, but it can be delayed until Oct. 2026, when the CA 2011 would have expired ANY WAY.

Which means you need to complete this before Oct. 2026 or none of your PC's will boot (without turning off Secure Boot mode).

Thanks. My PC is new... post the creation of the 2023 certificate... and yet MS still included the 2011 certificate.

Do the certificates have a start date? Are the 2023 certificates valid now? Could they have left out the old certificate?
 

My Computer

System One

  • OS
    Windows 11 Pro 24H2
    Computer type
    Laptop
    Manufacturer/Model
    HP
    CPU
    Intel Ultra 7 155H
    Memory
    16gb
    Graphics Card(s)
    Intel Arc integrated
    Hard Drives
    SSD
The start date is included in the certificate's name. A certificate's end date is determined the Certificate Authority which issued it. CA 2011 has a 15-year lifetime so it expires on 2011 + 15 = 2026. They could have picked any number of years, but 15 years seemed like a good length for a HW-based cert to minimize the number of UEFI updates.

Nobody anticipated Black Lotus, which set off a panic because of the chain reaction that had to happen afterwards.

If you bought a PC with only a CA 2023 cert then you can't run W7 or W8 with Secure Boot enabled. Because they're signed with the CA 2011, and hacking the boot file back into W7 or W8 isn't officially supported. So it doesn't make sense not to include it.

The PC maker isn't responsible for blocking CA 2011, because once they do that it, you can't easily undo the change. Would you buy a PC sold that way? It's more secure, but you don't have the option of running a legacy OS.
 

My Computer

System One

  • OS
    Windows 7
For the most part you don't delete an existing cert from the DB list, you just ban it from the DBX list.

What's the difference between UEFI CA 2011 and PCA 2011. Only PCA 2011 has been banned on my computer.

1748407461421.webp
 

My Computers

System One System Two

  • OS
    Win 11 Pro 24H2 26100.4202
    Computer type
    PC/Desktop
    Manufacturer/Model
    Self Built
    CPU
    Intel® Core™ i7-14700F
    Motherboard
    ASUS TUF Z690-PLUS WIFI BIOS v4101
    Memory
    G.SKILL Ripjaws S5 Series 64GB (2 x 32GB) DDR5
    Graphics Card(s)
    MSI GeForce RTX 3060 Ventus 2X 12GB OC
    Sound Card
    Sound Blaster AE-5 Plus
    Monitor(s) Displays
    ASUS TUF Gaming 27" 2K HDR Gaming
    Screen Resolution
    2560 x 1440
    Hard Drives
    Samsung 990 Pro 1TB NVMe (Win 11 24H2)
    SK hynix P41 500GB NVMe (24H2 VHDX)
    SK hynix P41 2TB NVMe (x3)
    Crucial P3 Plus 4TB
    PSU
    Corsair RM850x Shift
    Case
    Antec Dark Phantom DP502 FLUX
    Cooling
    Noctua NH-U12A chromax.black + 7 Phantek T-30's
    Keyboard
    Logitech MK 320
    Mouse
    Razer Basilisk V3
    Internet Speed
    350Mbs
    Browser
    Firefox
    Antivirus
    Winows Security
    Other Info
    Windows 11 24H2 26100.4202 (VHDX)
    On System One (Dual Boot)
  • Operating System
    Win 11 Pro 24H2 26100.4061
    Computer type
    PC/Desktop
    Manufacturer/Model
    Self Built
    CPU
    Intel Core i7-11700F
    Motherboard
    Asus TUF Gaming Z590 Plus WiFi
    Memory
    64 GB DDR4
    Graphics card(s)
    EVGA GeForce RTX 2060
    Sound Card
    SoundBlaster Audigy Fx V2
    Monitor(s) Displays
    Samsung F27T350
    Screen Resolution
    1920x1080
    Hard Drives
    Samsung 980 Pro 1TB
    Samsung 970 EVO Plus 2TB
    Samsung 870 EVO 500GB SSD
    PSU
    Corsair HX750
    Case
    Cougar MX330-G Window
    Cooling
    Hyper 212 EVO
    Internet Speed
    350Mbps
    Browser
    Firefox
    Antivirus
    Windows Security
- UEFI CA 2011 is used to sign 3rd-party UEFI modules
- UEFI Production PCA 2011 is used to sign the Windows boot file

Normally the UEFI module & boot file certs are installed as a pair. Thus you have two CA 2023 certs.

The DB list of certs are always appended to, they're not deleted (that's how the UEFI org wants it done). Your PC has revoked the CA 2011, and that's confirmed in the last line that the old boot manager is no longer trusted. You're done with changes.

If Windows begins the mandatory steps later this year, your PC will skip them since all the conditions are met.
 

My Computer

System One

  • OS
    Windows 7
Run this PowerShell script as Admin:
Code:
powershell -nop -ep bypass -f Check_EFIBootFile.ps1

The script will report which CA certificates have been added to the DB & DBX lists, and which boot file you currently have installed for the system drive.
Hi garlin,

Thanks for heads-up.

I ran the .ps1 script you provided and it returned the result in the below screenshot. EFI DBX Certificates section is empty. I think it is because I have not yet revoked the CA 2011 certificate.

CA_CERT.webp
 

My Computers

System One System Two

  • OS
    Windows 11 Pro build 26200.5622 (Dev)
    Computer type
    PC/Desktop
    Manufacturer/Model
    Home Built
    CPU
    Intel i7-4790
    Motherboard
    Asus H97 Pro Gamer with add-on TPM1.2 module
    Memory
    Teams DDR3-1600
    Graphics Card(s)
    MSI Nvidia GeForce GTX 1050Ti
    Sound Card
    Realtek ALC1150
    Monitor(s) Displays
    LG Flatron E2250
    Screen Resolution
    1920 by 1080 pixels
    Hard Drives
    Crucial NVMe PCIe M2 500 GB (Windows 11 v.24H2); Samsung SSD Evo 870 500 GB (Windows 11 v.24H2);
    PSU
    Corsair HX850
    Case
    Gigabyte Solo 210
    Cooling
    Zalman CNPS7X Tower
    Keyboard
    Microsoft AIO Wireless (includes touchpad)
    Mouse
    HP S1000 Plus Wireless
    Internet Speed
    200 Mb fiber optic
    Browser
    Chrome; MS Edge
    Antivirus
    Windows Defender
  • Operating System
    MacOS 12 Monterey
    Computer type
    Laptop
    Manufacturer/Model
    Apple Macbook Air
    CPU
    Intel Core i5
    Memory
    8 GB
    Graphics card(s)
    Intel integrated
    Screen Resolution
    1440 by 900 pixels
    Hard Drives
    128 GB
    Mouse
    Microsoft Wireless
    Keyboard
    Built-in
    Internet Speed
    802.11 ac
    Browser
    Chrome; Safari
    Antivirus
    N/A

My Computers

System One System Two

  • OS
    Windows 11 Pro build 26200.5622 (Dev)
    Computer type
    PC/Desktop
    Manufacturer/Model
    Home Built
    CPU
    Intel i7-4790
    Motherboard
    Asus H97 Pro Gamer with add-on TPM1.2 module
    Memory
    Teams DDR3-1600
    Graphics Card(s)
    MSI Nvidia GeForce GTX 1050Ti
    Sound Card
    Realtek ALC1150
    Monitor(s) Displays
    LG Flatron E2250
    Screen Resolution
    1920 by 1080 pixels
    Hard Drives
    Crucial NVMe PCIe M2 500 GB (Windows 11 v.24H2); Samsung SSD Evo 870 500 GB (Windows 11 v.24H2);
    PSU
    Corsair HX850
    Case
    Gigabyte Solo 210
    Cooling
    Zalman CNPS7X Tower
    Keyboard
    Microsoft AIO Wireless (includes touchpad)
    Mouse
    HP S1000 Plus Wireless
    Internet Speed
    200 Mb fiber optic
    Browser
    Chrome; MS Edge
    Antivirus
    Windows Defender
  • Operating System
    MacOS 12 Monterey
    Computer type
    Laptop
    Manufacturer/Model
    Apple Macbook Air
    CPU
    Intel Core i5
    Memory
    8 GB
    Graphics card(s)
    Intel integrated
    Screen Resolution
    1440 by 900 pixels
    Hard Drives
    128 GB
    Mouse
    Microsoft Wireless
    Keyboard
    Built-in
    Internet Speed
    802.11 ac
    Browser
    Chrome; Safari
    Antivirus
    N/A
I checked my computer by running the check command first. It returned with a "False", so I ran the other two commands and now the Secure Boot keys are updated. I do run Bitlocker and had no problem updating. System restarted normally.
Hi.

By executing the two commands, you updated the certificate on your Windows installation. But it seems your PC still boots on the older CA 2011 certificate.

If you do certificate updates on other areas and revoke the older certificate, you may need your Bitlocker key. After you revoke the CA 2011, your PC will attempt to boot on CA 2023. Then you may need your Bitlocker key. And unless you revoke the old certificate, you are still vulnerable.

Hope this helps.
 

My Computers

System One System Two

  • OS
    Windows 11 Pro build 26200.5622 (Dev)
    Computer type
    PC/Desktop
    Manufacturer/Model
    Home Built
    CPU
    Intel i7-4790
    Motherboard
    Asus H97 Pro Gamer with add-on TPM1.2 module
    Memory
    Teams DDR3-1600
    Graphics Card(s)
    MSI Nvidia GeForce GTX 1050Ti
    Sound Card
    Realtek ALC1150
    Monitor(s) Displays
    LG Flatron E2250
    Screen Resolution
    1920 by 1080 pixels
    Hard Drives
    Crucial NVMe PCIe M2 500 GB (Windows 11 v.24H2); Samsung SSD Evo 870 500 GB (Windows 11 v.24H2);
    PSU
    Corsair HX850
    Case
    Gigabyte Solo 210
    Cooling
    Zalman CNPS7X Tower
    Keyboard
    Microsoft AIO Wireless (includes touchpad)
    Mouse
    HP S1000 Plus Wireless
    Internet Speed
    200 Mb fiber optic
    Browser
    Chrome; MS Edge
    Antivirus
    Windows Defender
  • Operating System
    MacOS 12 Monterey
    Computer type
    Laptop
    Manufacturer/Model
    Apple Macbook Air
    CPU
    Intel Core i5
    Memory
    8 GB
    Graphics card(s)
    Intel integrated
    Screen Resolution
    1440 by 900 pixels
    Hard Drives
    128 GB
    Mouse
    Microsoft Wireless
    Keyboard
    Built-in
    Internet Speed
    802.11 ac
    Browser
    Chrome; Safari
    Antivirus
    N/A
You should running the command from a CMD or Terminal window, as Admin. If you get a path error, add .\Check_EFIBootFile.ps1 to say the script is in the current folder you're in.
Thanks, I'll check this later this AM when I can get to the PC. ;-)
 

My Computers

System One System Two

  • OS
    Windows 11 Home, ver 24H2 build 26100.3037
    Computer type
    Laptop
    Manufacturer/Model
    Hewlett-Packard Spectre 13-4001 x360 convertable
    CPU
    Intel Core i5 5200U @ 2.20GH
    Motherboard
    Hewlett-Packard 802D
    Memory
    4 GB
    Graphics Card(s)
    Intel HD Graphics 5500 on board
    Sound Card
    Intel Smart Sound Technology (Intel SST)
    Hard Drives
    Micron 256GB M.2 2280 NGFF SSD MTFDDAV256TBN, (SATA 6.0 Gb/s)
    Keyboard
    Model # G01KB
    Antivirus
    Microsoft Defender
    Other Info
    born on date: 25 Feb 2016
  • Operating System
    Win 10 22H2 build 19045.5854
    Computer type
    PC/Desktop
    Manufacturer/Model
    Asus Desktop model M32AD-US019S (new 2015)
    CPU
    Intel Core i7 4th Gen 4790 (3.60GHz), Haswell 22nm Technology, SOCKET 1150
    Motherboard
    H81M-E/M51AD/DP_MB
    Memory
    16 GB (8GB in 2 modules)
    Graphics card(s)
    NVIDIA GeForce GTX 760, 3GB
    Monitor(s) Displays
    HP EliteDisplay E241i LED; HP EliteDisplay E243
    Hard Drives
    Samsung 500GB SSD, 870 EVO (SATA 6.0 )
    Micron 250GB SSD, CT250MX500
    Toshiba HDD, 3GB (original drive w/PC)
    Case
    ASUS
    Keyboard
    ASUS-------------------------
    Antivirus
    MS Defender
You should running the command from a CMD or Terminal window, as Admin. If you get a path error, add .\Check_EFIBootFile.ps1 to say the script is in the current folder you're in.
Thanks Garlin. Adding the path worked and I see that I do have Secure Boot and it is enabled, though I cn't see from the BIOS where its Enable/Disable switch is located. Thanks for the script!

Code:
Windows PowerShell
Copyright (C) Microsoft Corporation. All rights reserved.

Try the new cross-platform PowerShell https://aka.ms/pscore6

PS C:\WINDOWS\system32> powershell -nop -ep bypass -f C:\Users\theislands\Downloads\Check_EFIBootFile.ps1
Secure Boot: ENABLED

EFI DB Certificates
-------------------
    Microsoft Corporation UEFI CA 2011
    Microsoft Windows Production PCA 2011

EFI DBX Certificates
--------------------

AvailableUpdates: 0x0
---------------------

EFI Files
---------
Boot Manager [Microsoft Windows Production PCA 2011] on Disk 0 is allowed.

PS C:\WINDOWS\system32>
 

My Computers

System One System Two

  • OS
    Windows 11 Home, ver 24H2 build 26100.3037
    Computer type
    Laptop
    Manufacturer/Model
    Hewlett-Packard Spectre 13-4001 x360 convertable
    CPU
    Intel Core i5 5200U @ 2.20GH
    Motherboard
    Hewlett-Packard 802D
    Memory
    4 GB
    Graphics Card(s)
    Intel HD Graphics 5500 on board
    Sound Card
    Intel Smart Sound Technology (Intel SST)
    Hard Drives
    Micron 256GB M.2 2280 NGFF SSD MTFDDAV256TBN, (SATA 6.0 Gb/s)
    Keyboard
    Model # G01KB
    Antivirus
    Microsoft Defender
    Other Info
    born on date: 25 Feb 2016
  • Operating System
    Win 10 22H2 build 19045.5854
    Computer type
    PC/Desktop
    Manufacturer/Model
    Asus Desktop model M32AD-US019S (new 2015)
    CPU
    Intel Core i7 4th Gen 4790 (3.60GHz), Haswell 22nm Technology, SOCKET 1150
    Motherboard
    H81M-E/M51AD/DP_MB
    Memory
    16 GB (8GB in 2 modules)
    Graphics card(s)
    NVIDIA GeForce GTX 760, 3GB
    Monitor(s) Displays
    HP EliteDisplay E241i LED; HP EliteDisplay E243
    Hard Drives
    Samsung 500GB SSD, 870 EVO (SATA 6.0 )
    Micron 250GB SSD, CT250MX500
    Toshiba HDD, 3GB (original drive w/PC)
    Case
    ASUS
    Keyboard
    ASUS-------------------------
    Antivirus
    MS Defender
Hi.
Current Microsoft Secure Boot Keys will expire in 2026. Therefore, it may be advisable to update the keys manually in advance.
Hope you find this post helpful.
Hi there
Thank you.
This solved my problem whenever I tried to install windows from UUPDump. I had to disable secure boot before installation :)
 

My Computers

System One System Two

  • OS
    Windows 11 Pro 24H2
    Computer type
    Laptop
    Manufacturer/Model
    Huawei MateBook D15
    CPU
    Ryzen 5 3500U
    Memory
    8GB
    Graphics Card(s)
    Vega 8
    Screen Resolution
    FHD
    Hard Drives
    256GB Samsung SSD + 1TB HDD
    Browser
    Microsoft Edge
    Antivirus
    ESET Smart Security Premium
  • Operating System
    Windows 10 Enterprise LTSC 21H2
    Computer type
    Laptop
    Manufacturer/Model
    MSI GS73 6RF Stealth Pro
    CPU
    intel core i7 6700HQ
    Memory
    16GB
    Graphics card(s)
    Nvidia Geforce GTX1060 (6GB)
    Screen Resolution
    FHD
    Hard Drives
    128GB SSD + 1TB HDD
    Browser
    Microsoft Edge
    Antivirus
    Windows Defender
Can anyone convert these commands to cmd?
 

My Computers

System One System Two

  • OS
    Windows 11 Pro 24H2
    Computer type
    Laptop
    Manufacturer/Model
    Huawei MateBook D15
    CPU
    Ryzen 5 3500U
    Memory
    8GB
    Graphics Card(s)
    Vega 8
    Screen Resolution
    FHD
    Hard Drives
    256GB Samsung SSD + 1TB HDD
    Browser
    Microsoft Edge
    Antivirus
    ESET Smart Security Premium
  • Operating System
    Windows 10 Enterprise LTSC 21H2
    Computer type
    Laptop
    Manufacturer/Model
    MSI GS73 6RF Stealth Pro
    CPU
    intel core i7 6700HQ
    Memory
    16GB
    Graphics card(s)
    Nvidia Geforce GTX1060 (6GB)
    Screen Resolution
    FHD
    Hard Drives
    128GB SSD + 1TB HDD
    Browser
    Microsoft Edge
    Antivirus
    Windows Defender

Latest Support Threads

Back
Top Bottom