Edit

Manage Secure Boot updates

This article describes how Azure Local manages the transition from the 2011 Secure Boot certificates, which expire in June 2026, to the 2023 Secure Boot certificates, including how it mitigates CVE-2023-24932 and why the changes are delivered through a phased rollout.

It also covers how Azure Local orchestrates Secure Boot updates alongside OEM and hardware updates including Solution Builder Extension (SBE) packages and provides guidance for monitoring and validating each stage of the update process.

This article is intended for Azure Local cluster operators, OEMs, solution integrators, and IT administrators who manage Secure Boot, firmware (Basic Input/Output System (BIOS) or Unified Extensible Firmware Interface (UEFI)), and operating system updates and reboots.

Important

Secure Boot revocation actions can be irreversible while Secure Boot remains enabled. Always validate updates on representative hardware and follow Microsoft guidance before adding changes broadly.

About Secure Boot certificates

  • Secure Boot certificates are issued with defined lifetimes. Periodically refreshing these certificates helps keep them aligned with current security requirements. For Azure Local, you must install the 2023 Secure Boot certificate authorities (CAs) before the 2011 CAs begin to expire in June 2026.

  • 2023 Secure Boot certificates are delivered via OEM firmware updates or Azure Local updates starting with the 2603 release. Azure Local built‑in orchestration provides Secure Boot 2023 certificate update when applied through a platform update.

  • CVE-2023-24932 is a Secure Boot security feature bypass associated with the BlackLotus UEFI bootkit. Fully fixing it requires updating boot components and applying revocations, such as through DBX updates, so older vulnerable boot managers can't bypass Secure Boot.

  • Because Secure Boot updates interact with platform firmware (UEFI variables) and boot-time security technologies like BitLocker and Virtualization-based Security (VBS), we recommend a phased approach with thorough testing and controlled rollout in enterprise environments.

  • For Azure Local, a key consideration is maintaining clear sequencing between update types. Secure Boot updates should be applied separately from hardware or firmware (BIOS or UEFI) updates. Perform these updates in distinct maintenance steps to help ensure a stable and predictable boot‑time security state.

  • Azure Local’s mitigation implementation therefore focuses on orchestration and gating:

    1. Orchestrate the installation of the 2023 Secure Boot certificates across cluster nodes, including required reboots, and installing boot manager signed by Windows UEFI CA 2023.
    2. Avoid applying Secure Boot updates on the same reboot as firmware updates.

Background: CVE-2023-24932 and staged mitigations

Microsoft provides enterprise guidance for adding protections for CVE‑2023‑24932. These mitigations require coordinated changes across Windows and device firmware. To minimize risk and avoid operational disruption, we recommend you plan and test before adding these changes broadly.

  • Threat model: An attacker with physical access or administrator privileges can attempt to bypass Secure Boot by using older trusted boot components.

  • Mitigation principle: Update trust anchors and boot components and then apply revocations so older vulnerable boot managers become untrusted.

  • Operational reality: Secure Boot updates interact with platform firmware in different ways. In rare cases, firmware behavior might affect boot outcomes. We recommend you test on representative hardware and coordinate with OEM firmware as part of a controlled update.

For more information, see Enterprise deployment guidance for CVE-2023-24932 (Microsoft Support).

Terminology and components

  • Secure Boot: A security feature of UEFI based firmware that helps ensure only trusted software runs during the device boot (start) sequence.

  • UEFI Secure Boot databases:

    • DB: Contains allowed signatures.
    • DBX: Contains revoked signatures.

    Updates are stored in the UEFI firmware variables.

  • Key Exchange Key (KEK): Authorizes updates to the Secure Boot DB and DBX.

  • Certificates used: The industry is transitioning from older 2011-era Microsoft Secure Boot CAs to newer 2023 CAs, such as Windows UEFI CA 2023. The 2011 Secure Boot certificates expire in 2026.

  • Windows Boot Manager revocations: Policy and data (often in DBX) used to prevent older vulnerable or malicious boot managers from being accepted by Secure Boot.

  • Solution Builder Extension: A package that lets OEMs publish and apply updates to the hardware and firmware components. An SBE uniquely tracks which Azure Local Solution Versions it's compatible with and includes health checks to ensure it's appropriate to install.

Azure Local host Secure Boot 2023 certificates playbook

Secure Boot 2023 certificate updates and mitigations for CVE‑2023‑24932 aren’t a single "flip‑the‑switch" operation. Instead, they consist of a sequence of state transitions that must be validated against the specific platform firmware and boot configuration.

Azure Local staged update model

To safely roll out the Secure Boot certificate updates, Azure Local tracks nodes through conceptual stages, as described in the following table:

Stage Description Why it matters Release version
Stage 0 The 2023 Secure Boot CA isn't present in the firmware databases. The node can't rely on 2023-signed boot components. Before 2603
Stage 1 The 2023 Secure Boot CA is present in the firmware databases. The node is closer to being ready, and subsequent steps can be scheduled. 2603
Stage 2 The node boots by using the 2023 CA-signed boot manager. The platform demonstrated compatibility, making later revocations safer to apply. 2603

Note

For some hardware platforms, you might need to manually update firmware before advancing to stages 1 and 2 described in the preceding table.

Why Azure Local adds extra orchestration

Azure Local servicing is cluster-aware and can include coordinated reboots, OS updates, and in some cases firmware or BIOS updates. Some platforms can experience boot-time security side effects if a Secure Boot update sequence and a firmware update sequence are applied too closely together, for example, during the same reboot cycle. To reduce this risk, Azure Local treats Secure Boot mitigation as a managed workflow with explicit prechecks, ordering guarantees, and safety gates.

Azure Local host implementation details

Orchestration mechanics (CAU plugin and node workflow)

Azure Local applies Secure Boot mitigations by using a cluster-aware orchestration component based on a Cluster-Aware Updating (CAU) plugin. The plugin coordinates node-by-node progression and ensures each node advances only when it's safe.

  • Preflight check: Confirm that Secure Boot is enabled and the node is in a supported configuration. For example, no unexpected Secure Boot key customization.

  • Safety checks: Confirm that boot protection technologies that can be sensitive to firmware variable changes (like BitLocker) are handled appropriately.

  • Controlled reboot sequencing: When a Secure Boot update step requires a reboot, the plugin schedules and monitors the node reboot and validates progress before continuing.

  • Health states: If a node fails to progress on the update (or reports firmware incompatibility), the workflow moves to the next node to avoid leaving the cluster in an unknown or partially updated state.

Interaction with SBE and firmware updates (blocking + ordering)

A core design requirement is to avoid applying Secure Boot mitigation steps during the same reboot as a firmware update (BIOS or UEFI). Azure Local enforces this requirement by blocking or deferring SBE and firmware update actions while Secure Boot mitigation is in progress.

  • If a firmware update is planned, Azure Local prefers to complete the Secure Boot readiness steps first, validating the outcome, and only then allowing firmware updates.

  • If a subsequent Secure Boot step is scheduled after an earlier reboot, Azure Local attempts to avoid unplanned reboots that could later coincide with firmware updates before that second step completes.

Observability: Monitoring progress

Windows records Secure Boot DB and DBX update successes and failure reasons in the Windows Event Log. These events are the primary supported method to determine whether updates are applied, postponed, or blocked due to safety conditions.

  • Monitor the Secure Boot DB and DBX-related event IDs described by Microsoft. For example, events indicating BitLocker must be suspended, that a vulnerable bootloader is detected, or that DB or DBX updates succeeded.

  • Track node stage transitions in Azure Local update logs (cluster update output) to verify that each node completes the expected sequence before moving to the next node.

Before you start (inventory and readiness)

  • Take inventory of all Azure Local nodes, including hardware model, firmware version, Secure Boot configuration, and boot media usage.

  • Contact your OEM to understand whether a platform firmware is required to install 2023 Secure Boot certificates and when they are making it available.

  • Validate the update process on representative hardware first (at least one system per platform type). Validate both normal boot scenarios and recovery or media‑based boot scenarios.

    Note

    Azure Local solutions can be updated to version 2603 even if the required firmware updates aren’t available at the time of the update.

During rollout

  • Update to 2603 that includes the Secure Boot mitigation orchestration, using planned maintenance windows.

  • Monitor Secure Boot update events during pilot phases. Don’t proceed to broad rollout if updates are blocked or postponed on pilot nodes.

  • Use the following command to confirm whether Secure Boot certificate updates have completed:

    Test-AzSSecureBootUpdateCompleted
    
    • If the returned value is True, the Secure Boot certificate update steps are complete.
    • If the returned value is False, follow the documented troubleshooting steps.

    Note

    Azure Local solution updates retry the Secure Boot 2023 certificate update on a best‑effort basis. If the update can't be completed, the solution update proceeds, even when a firmware update is required by the hardware solution.

After rollout (verification and continued operations)

  • Confirm that all nodes boot with the expected updated boot components and that the Secure Boot mitigation reaches a stable stage across the cluster.

Troubleshooting and safety notes

  • If firmware blocks a Secure Boot update, work with your OEM to obtain the required firmware update. Don't force untrusting 2011 certificates without validating that the firmware can boot.

  • Follow the documented troubleshooting guidance to diagnose blocked or postponed Secure Boot updates.

For more information, see Original Equipment Manufacturer (OEM) pages for Secure Boot.

For step-by-step troubleshooting instructions, see the Troubleshooting guide.

What if I can't update before July 2026?

After Secure Boot-related certificates expire, devices without the new certificates can continue to boot and run, and regular Windows updates still install. However, these devices don't receive any new boot-level security updates or protections. This lack of updates includes Windows Boot Manager, Secure Boot databases, revocation lists, or fixes for new boot vulnerabilities.

We strongly recommend completing this update as soon as possible. If you require firmware updates for supported hardware, contact your OEM to understand availability and timelines.

Azure Local VM Secure Boot 2023 certificates playbook

Azure Local clusters might host VMs that are affected by Secure Boot certificate expiration. The required actions depend on when the VMs were created.

  • VMs created before October 2024

    If VMs (Arc-enabled VMs or VMs created using traditional deployment methods) were created before October 2024, the Secure Boot certificate exposed to the VM will be before 2023 CAs were broadly available. Manual action is required. Follow the guidance in Windows Server Secure Boot playbook for certificates expiring in 2026.

  • VMs created after October 2024

    If VMs (Arc-enabled VMs or VMs created using traditional deployment methods) were created after October 2024, the VM should already have the new 2023 CA firmware in place.

    Check for the 2023 CAs by running the following PowerShell commands. Each command should return True.

    [System.Text.Encoding]::ASCII.GetString((Get-SecureBootUEFI db).bytes) -match 'Windows UEFI CA 2023'
    
    [System.Text.Encoding]::ASCII.GetString((Get-SecureBootUEFI kek).bytes) -match 'Microsoft Corporation KEK 2K CA 2023'
    

Support and escalation guidance

If you have issues while planning, orchestrating, or verifying Secure Boot updates, contact Microsoft Support before proceeding with other firmware (BIOS or UEFI) changes or enabling revocations in production environments.

For more information about how to get support, see Get support for Azure Local.

For detailed troubleshooting, see the Troubleshooting guide.

This feature applies only to Azure Local 2603 or later.