Microsoft has announced that the Secure Boot CA (Certificate Authority) 2011 certificates will expire in June 2026. After these dates, Windows devices relying solely on these certificates will no longer receive security updates for the Windows Boot Manager and related Secure Boot components, potentially increasing vulnerability to boot-level threats (such as bootkits).
To address this, Microsoft is transitioning to new 2023 certificates. Supermicro already released BIOS firmware updates to prepare the Secure Boot database for the new certificates.
Here are BIOS versions for the Intel-based affected motherboards:
Intel-based Motherboards
| X12-CedarIsland | BIOS version with the fix |
|---|---|
| X12QCH+ | by request |
| X12/C9-Comet Lake | BIOS version with the fix |
|---|---|
| X12SAE/X12SCA-F | v 3.6 |
| X12SCQ | v 3.6 |
| X12SCV-LVDS | v 3.6 |
| X12SCV-W | v 3.6 |
| X12SCZ-TLN4F/QF/F | v 3.6 |
| C9Z490-PGW | v 3.6 |
| X12-Idaville | BIOS version with the fix |
|---|---|
| X12SDV-SPT4F | v 2.3 |
| X12SDV-SP6F | v 2.3 |
| X12SDV-SPT8F | v 2.3 |
| B3SD1 | v 2.3 |
| X12-Tatlow | BIOS version with the fix |
|---|---|
| X12STW | v 2.5 |
| X12STH | v 2.5 |
| X12STD | v 2.5 |
| X12STE | v 2.5 |
| X12STL-IF | v 2.5 |
| X12STL-F | v 2.5 |
| B3ST1 | v 2.5 |
| X12-TigerLake | BIOS version with the fix |
|---|---|
| X12STN | v 2.0 |
| X12/C9-Rocketlake | BIOS version with the fix |
|---|---|
| X12SAE-5 | by request |
| X12SCA-5F | by request |
| C9Z590-CG(W) | by request |
| X12-Whitley | BIOS version with the fix |
|---|---|
| B12DPE-6 | v 2.6 |
| B12DPT-6 | v 2.6 |
| B12SPE-CPU | v 2.6 |
| X12DAi-N6 | v 2.6 |
| X12DGO-6 | v 2.6 |
| X12DGQ-R | v 2.6 |
| X12DPG-AR | v 2.6 |
| X12DPG-OA6 | v 2.6 |
| X12DPG-OA6-GD2 | v 2.6 |
| X12DPG-QR | v 2.6 |
| X12DPG-QBT6 | v 2.6 |
| X12DPG-QT6 | v 2.6 |
| X12DPG-U6 | v 2.6 |
| X12DPi-N(T)6 | v 2.6 |
| X12DPL-i6/NT6 | v 2.6 |
| X12DDW-A6 | v 2.6 |
| X12DGU | v 2.6 |
| X12DHM-6 | v 2.6 |
| X12DPD-A/AM25 | v 2.6 |
| X12DPFR-AN6 | v 2.6 |
| X12DPT-B6 | v 2.6 |
| X12DPT-PT6/-PT46 | v 2.6 |
| X12DPU-6 | v 2.6 |
| X12DSC-6 | v 2.6 |
| X12DSC-A6 | v 2.6 |
| X12SPO-(NT)F | v 2.6 |
| X12SPM Series | v 2.6 |
| X12SPW-(T)F | v 2.6 |
| X12SPL-LN4F | v 2.6 |
| X12SPZ-SPLN6F/LN4F | v 2.6 |
| X12SPi-TF | v 2.6 |
| X12SPA-TF | v 2.6 |
| X12SPED-F | v 2.6 |
| X12SPG-NF | v 2.6 |
| X12SPT-PT | v 2.6 |
| X12SPT-G(C) | v 2.6 |
| X12DPi | v 2.6 |
| X13-AlderLake | BIOS version with the fix |
|---|---|
| B4SA1-CPU | v 5.3 |
| X13SAE | v 5.3 |
| X13SAE-F | v 5.3 |
| X13SAN-H/-E/-L/-C | v 5.3 |
| X13SAQ | v 5.3 |
| X13SAV-LVDS | v 5.3 |
| X13SAV-PS | v 5.3 |
| X13SAZ-F | v 5.3 |
| X13SAZ-Q | v 5.3 |
| X13-Catlow | BIOS version with the fix |
|---|---|
| X13SCL-IF | v2.4 |
| X13SCL-F | v2.4 |
| X13SCH | v2.4 |
| X13SCD-F | v2.4 |
| X13SCW | v2.4 |
| B4SC1 | v2.4 |
| X13-Eagle Stream | BIOS version with the fix |
|---|---|
| X13DEH | v 3.0 |
| X13DEG-OAD | v 3.0 |
| X13DEG-OA | v 3.0 |
| X13DGU | v 3.0 |
| X13QEH+ | v 3.0 |
| X13DAi-T | v 3.0 |
| X13DDW | v 3.0 |
| B13DEE | v 3.0 |
| B13DET | v 3.0 |
| B13SEE-CPU-25G | v 3.0 |
| B13SEG | v 3.0 |
| X13DEG-M | v 3.0 |
| X13DEG-QT | v 3.0 |
| X13DEG-R | v 3.0 |
| X13DEG-PVC | v 3.0 |
| X13DEi(-T) | v 3.0 |
| X13DEM | v 3.0 |
| X13DET-B | v 3.0 |
| X13DSF-A | v 3.0 |
| X13SEDW-F | v 3.0 |
| X13SEED-F/SF | v 3.0 |
| X13SEFR-A | v 3.0 |
| X13SEI-TF/-F | v 3.0 |
| X13SEM-TF | v 3.0 |
| X13SET-G/-GC | v 3.0 |
| X13SET-PT | v 3.0 |
| X13SEVR-SP13F | v 3.0 |
| X13SEW | v 3.0 |
| X13SEW-TF-OS1 | v 3.0 |
| X13OEi | v 3.0 |
| X13-FishHawk Falls | BIOS version with the fix |
|---|---|
| X13SRA-TF | v 2.6 |
| X13SWA-T(F) | v 2.6 |
| X13-Raptor Lake | BIOS version with the fix |
|---|---|
| X13SRN-H/-E/-WOHS | v 5.3 |
| X14-Birch Stream | BIOS version with the fix |
|---|---|
| X14SBW-F/-TF | v 1.6 |
| X14SBT-G | v 1.6 |
| X14SBHM | v 1.6 |
| X14SBSC | v 1.6 |
| X14SBI-(T)F | v 1.6 |
| X14SBH-AP | v 1.6 |
| X14SBT-GAP | v 1.6 |
| X14SBM-TF/TP4F | v 1.6 |
| X14DBG-GD | v 1.6 |
| X14DBI-(T) | v 1.6 |
| X14DBG-XAP | v 1.6 |
| X14DBM-AP | v 1.6 |
| X14DBM-SP | v 1.6 |
| X14DBT-B | v 1.6 |
| X14DBHM | v 1.6 |
| X14DBG-MAP | v 1.6 |
| X14DBT-FAP / X14DBT-FLAP | v 1.6 |
| X14-Arrow lake | BIOS version with the fix |
|---|---|
| X14SAE | v 2.0 |
| X14SAE-F | v 2.0 |
| X14SAV-LVDS | v 2.0 |
| X14SAV-TLN4F/F | v 2.0 |
| X14SAZ-TLN4F/F | v 2.0 |
| X14-Kaseyville | BIOS version with the fix |
|---|---|
| X14SDV-SP3F | v 1.4 |
| X14SDW-SP9F | v 1.4 |
The information for AMD-based motherboards will be published shortly.
What You Should Do
- Keep Secure Boot enabled – it remains effective and important for system security.
- Install all available updates:
- Install the latest BIOS/firmware updates.
- No immediate action required for most systems – the transition is proactive and will complete automatically on supported devices.
This change does not prevent devices from booting after 2026, but staying updated ensures ongoing protection.
For further details, please refer to the Microsoft announcement: