What effect does recent Windows 11 Update to change certificate validation have?
1. Affected Update: KB5050021
Multiple reports show that KB5050021 introduced a change in how Windows validates certificate chains. After installing it, Windows began treating some certificates as explicitly revoked, even though the developers insist they were not.
Example: The popular tool Everything (Voidtools) stopped launching because Windows claimed its certificate—signed Jan 1, 2025—was revoked.
Rolling back the update restored functionality.
This strongly suggests the update tightened or altered the certificate trust logic rather than the certificates actually being revoked by DigiCert.
2. Why Windows Would Do This
Windows 11 has been steadily increasing enforcement around digital signatures for security reasons:
A. Stricter UAC Enforcement
Windows 11’s UAC blocks elevation for executables signed with revoked or untrusted certificates.
If an update changes the trust store or revocation list, UAC will immediately start blocking affected apps.
B. Certificate Chain Hardening
Microsoft has been preparing for major certificate expirations (e.g., Secure Boot certificates expiring in 2026).
This has led to more aggressive validation and cleanup of older or misconfigured certificate chains.
C. Driver & Executable Signature Enforcement
Windows 11 refuses to load drivers or executables if:
The certificate is expired
The certificate is revoked
The certificate chain is incomplete or mismatched
When an update modifies the trusted root store or revocation lists, legitimate software can get caught in the crossfire.
3. Why It Looked Like “Revoked Signature Updates”
The key issue is not that Microsoft intentionally revoked developer certificates.
Instead, the update caused Windows to treat certain certificates as revoked because:
The DigiCert Trusted Root G4 chain was broken or reinterpreted
Revocation lists (CRLs/OCSP) were updated or misapplied
Windows tightened chain validation logic
Some intermediate certificates were removed or replaced
This created a false‑positive revocation scenario.
4. How Users Confirmed the Issue
People who restored a disk image before KB5050021 found everything worked normally.
After reinstalling the update, the certificate errors returned.
This strongly indicates the update—not the certificates—was the trigger.
5. What You Can Do (Safely)
Here are the practical, non‑risky steps:
A. Check if the affected software has released a new build
Developers often re‑sign their binaries with a different certificate chain.
B. Temporarily uninstall KB5050021
If the issue is blocking critical tools, rolling back the update restores functionality.
C. Wait for Microsoft to patch the trust store
These certificate‑chain regressions are usually corrected in the next cumulative update.
D. Avoid disabling signature enforcement
While possible, it’s not recommended for system security.
If you want, I can walk you through diagnosing a specific executable or certificate chain on your system—just tell me the file or the error code you’re seeing.