Secure Boot certificate update failures or warnings in VMware virtual machines as Microsoft Secure Boot certificates approach expiration.
One or more of the following symptoms may be present:
"Updated Secure Boot certificates are available on this device but have not yet been applied to the firmware. Review the published guidance to complete the update and maintain full protection. This device signature information is included here."Important Note:
There is no automated resolution available at this time. In coordination with Microsoft, Broadcom Engineering Team is actively working towards implementing an automated solution in a future release to update the Platform Key (PK) on the affected VMs which will facilitate the certificate rollout as outlined in Microsoft Guideline (MS KB ID: 5062713).
mokutil --pk
$pk = Get-SecureBootUEFI -Name PK
$bytes = $pk.Bytes
$cert = $bytes[44..($bytes.Length-1)]
[IO.File]::WriteAllBytes("PK.der", $cert)
certutil -dump PK.derPS C:\> $pk = Get-SecureBootUEFI -Name PKPS C:\> $bytes = $pk.BytesPS C:\> $cert[44..($bytes.Length-1)]Cannot index into a null array.At line:1 char:1+ $cert[44..($bytes.Length-1)]+ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + CategoryInfo : InvalidOperation: (:) [], RuntimeException + FullyQualifiedErrorId : NullArray00" as below, which also means that the Platform Key (PK) is invalid.PS C:\> certutil -dump PK.der 00 . CertUtil: -dump command completed successfully.PS C:\>$bytes.Length 45mokutil --kek
[System.Text.Encoding]::ASCII.GetString((Get-SecureBootUEFI KEK).Bytes) -match 'Microsoft Corporation KEK 2K CA 2023'If Secure Boot updates continue to fail after the required KEK is installed, contact Broadcom Support for further assistance.