Secure Boot certificate update failures or warnings in VMware virtual machines as Microsoft Secure Boot certificates approach expiration.
One or more of the following symptoms may be present:
"Updated Secure Boot certificates are available on this device but have not yet been applied to the firmware. Review the published guidance to complete the update and maintain full protection. This device signature information is included here."The Secure Boot updated failed to update KEK 2023 with error invalid access to memory location.Important Note:
There is no automated resolution available at this time. In coordination with Microsoft, Broadcom Engineering Team is actively working towards implementing an automated solution in a future release to update the Platform Key (PK) on the affected VMs which will facilitate the certificate rollout as outlined in Microsoft Guideline (Secure Boot Certificate updates: Guidance for IT professionals and organizations - 5062713 ).
mokutil --pk$pk = Get-SecureBootUEFI -Name PK
$bytes = $pk.Bytes
$cert = $bytes[44..($bytes.Length-1)]
[IO.File]::WriteAllBytes("PK.der", $cert)
certutil -dump PK.derPS C:\> $pk = Get-SecureBootUEFI -Name PK
PS C:\> $bytes = $pk.Bytes
PS C:\> $cert[44..($bytes.Length-1)]
Cannot index into a null array.
At line:1 char:1
+ $cert[44..($bytes.Length-1)]
+ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+ CategoryInfo : InvalidOperation: (:) [], RuntimeException
+ FullyQualifiedErrorId : NullArray00" as below, which also means that the Platform Key (PK) is invalid.PS C:\> certutil -dump PK.der
00 .
CertUtil: -dump command completed successfully.
PS C:\>$bytes.Length
45mokutil --kek[System.Text.Encoding]::ASCII.GetString((Get-SecureBootUEFI KEK).Bytes) -match 'Microsoft Corporation KEK 2K CA 2023'Q: What is UEFI Secure Boot, and how does it work in vSphere VMs?
UEFI Secure Boot is a firmware-based security feature that ensures a virtual machine boots only with trusted, digitally signed software by enforcing a cryptographic chain of trust from firmware to OS loader. In VMware vSphere VMs, this is implemented in the virtual UEFI (vUEFI) firmware, which validates each boot component using Secure Boot databases stored in virtual NVRAM: the Platform Key (PK) establishes the root of trust, the Key Exchange Key (KEK) authorizes updates, the DB contains allowed signatures, and the DBX lists revoked ones. During boot, the firmware verifies the bootloader (e.g., Windows Boot Manager), which in turn verifies subsequent components, preventing execution of untrusted code. The Secure Boot state persists with the VM (including across vMotion), integrates with vTPM for measured boot (e.g., PCR7 for BitLocker and VBS), and supports authenticated updates—often delivered via OS-Driven authenticated writes or firmware update capsules —to maintain trust over time.
SecureBoot Trust Delegation Model
Platform Ownership (PK)
│
▼
Delegated Update Authority (KEK)
│
▼
Operational Trust Lists (DB / DBX)
Q: What are the original certificates stored in vUEFI PK, KEK and DB databases?
For vSphere VMs, Secure Boot certificates are initialized by the host at the first VM power-on and remain static for the life of the VM unless updated. The following table outlines the default certificate set based on the ESX version and VM HW Version used at the time of VM creation.
| ESX Version and VM HW Version at VM creation | vUEFI database | Certificate | Expiration date |
|---|---|---|---|
9.x.x.x releases AND VM HW Version 14 or newer | PK | Windows OEM Devices PK | Sep 2038 |
KEK | Microsoft Corporation KEK 2K CA 2023 | Mar 2038 | |
| Microsoft Corporation KEK CA 2011 | Jun 2026 | ||
DB
| Windows UEFI CA 2023 | Jun 2035 | |
Microsoft UEFI CA 2023 | Jun 2038 | ||
Microsoft Windows Production PCA 2011 | Oct 2026 | ||
Microsoft Corporation UEFI CA 2011 | Jun 2026 | ||
VMware Certificate | Dec 2019 | ||
VMware Secure Boot Signing | Oct 2037 | ||
8.0 U2 and 8.0 U3, up to current 8.x release AND VM HW Version 14 or newer | PK | VMW.NULLPK | N/A |
KEK | Microsoft Corporation KEK 2K CA 2023 | Mar 2038 | |
| Microsoft Corporation KEK CA 2011 | Jun 2026 | ||
DB | Windows UEFI CA 2023 | Jun 2035 | |
Microsoft UEFI CA 2023 | Jun 2038 | ||
Microsoft Windows Production PCA 2011 | Oct 2026 | ||
Microsoft Corporation UEFI CA 2011 | Jun 2026 | ||
VMware Certificate | Dec 2019 | ||
VMware Secure Boot Signing | Oct 2037 | ||
Note: Secure Boot support for vSphere VMs was introduced starting with HW Version 13. | PK | VMW.NULLPK | N/A |
KEK | Microsoft Corporation KEK CA 2011 | Jun 2026 | |
DB | Microsoft Windows Production PCA 2011 | Oct 2026 | |
Microsoft Corporation UEFI CA 2011 | Jun 2026 | ||
VMware Certificate | Dec 2019 | ||
VMware Secure Boot Signing | Oct 2037 |
Note: Starting from a planned 8.0 U3 patch release, the Windows OEM Devices PK certificate will be automatically initialized in the PK for newly created VMs (HW Version >= 14). We will update this KB once that patch becomes available.
Q: What is the Microsoft Secure Boot Certificates expiration and transition?
Please refer to the official Microsoft documentation: Secure Boot Certificate Updates Guidance
Q: What vSphere VMs are affected by this transition, and how?
Q: What will happen to my Secure Boot-enabled VMs if I cannot update KEK and DB certificates prior to their expiration?
Q: Who is responsible for updating PK, KEK, and DB for Secure Boot-enabled VMs?
VMware's Responsibility:
VMware is taking the lead on ensuring the presence of the Windows OEM Devices PK certificate in the virtual firmware to facilitate KEK update. Our goal is to minimize operational overhead through automated delivery mechanisms for VMs running on major ESX versions currently under General Support.
Customer's Responsibility:
Q: How can I update PK?
You should always update PK using VMware-supported methods. All methods below require VM Hardware Version 14 or newer. (Note: Secure Boot support was introduced in Hardware Version 13, but updating PK requires the virtual NVRAM capabilities of Hardware Version 14+). VMware currently provides, or plans to provide, the following four update methods:
We will update this KB when the planned patches become available.
Q: How can I identify VMs that are lacking the Windows OEM Devices PK certificate?
We will update this KB when the planned patches become available and will also provide the sample script here.
Q: What are the VMware-recommended PK update workflow and detailed steps for vSphere 8.x and 9.x?
To minimize operational effort for PK update for Secure Boot-enabled VMs across a cluster containing various VM types, we recommend proceeding in the following order:
We will update this KB with detailed steps for each workflow when the planned patches delivering these PK update methods become available.
Q: Will there be future patch for vSphere 7.x version?
As vSphere 7 is beyond its End of General Support date, no automated update tools will be available. Customers remaining on vSphere 7 must perform manual updates for existing and newly created VMs referencing Manual Update of the Secure Boot Platform Key in Virtual Machines or upgrade to a supported version of vSphere to utilize the automation methods.
Q: When can I update PK?
After reviewing the answers to the above questions, you should decide on your update window based on the specific tools you choose to use and the availability of the required patches, as described above.
Q: How can I update KEK and DB?
Q: When can I update KEK?
Q: When can I update DB?
Q: When will the Microsoft 2011 DB certificates be forced into revocation?
Certificate revocation means it is explicitly removed from the DB or added to the DBX . We are not currently aware of any near-term timeline for a forced revocation from our OS partners. Please consult your OS vendor for this.
Q: How does the omission of the Microsoft Option ROM UEFI CA 2023 from vSphere VMs affect the Secure Boot certificate transition?
Currently, the Microsoft Option ROM UEFI CA 2023 certificate is not automatically initialized into the vUEFI DB during VM creation.
If you plan to upgrade the firmware of your passthrough device, you must first consult your hardware vendor to understand if the new device firmware solely relies on the Microsoft Option ROM UEFI CA 2023 certificate for Secure Boot verification. If so, this certificate must be present in the VM’s vUEFI DB before the firmware upgrade is performed.
For VMs that require this certificate, we recommend the following steps to add the Microsoft Option ROM UEFI CA 2023 certificate to the vUEFI DB prior to a passthrough device firmware upgrade: