Original publish date: May 20, 2025
KB ID: 5061682
Change date |
Change description |
July 2, 2025 |
|
Introduction
The article outlines the new Application Control for Business (formerly known as Windows Defender Application Control (WDAC)) handling logic for signer rules where a TBS hash value for a Microsoft intermediate certificate authority (CA) is specified.
Microsoft Issuing CAs
Microsoft and Windows components are signed by leaf certificates mainly issued by six Microsoft Issuing CAs. Beginning in July 2025, these 15-year Issuing CAs begin to expire according to the following schedule.
CA Name |
TBS hash |
Expiration Date |
Microsoft Code Signing PCA 2010 |
|
July 6, 2025 |
Microsoft Windows PCA 2010 |
|
July 6, 2025 |
Microsoft Code Signing PCA 2011 |
|
July 8, 2026 |
Windows Production PCA 2011 |
|
October 19, 2026 |
Microsoft Windows Third Party Component CA 2012 |
|
April 18, 2027 |
CA name |
TBS hash |
Microsoft Code Signing PCA 2010 is replaced with |
|
Microsoft Windows Code Signing PCA 2024 |
|
Microsoft Windows PCA 2010 is replaced with |
|
Microsoft Windows Component Preproduction CA 2024 |
|
Microsoft Code Signing PCA 2011 is replaced with |
|
Microsoft Code Signing PCA 2024 |
|
Windows Production PCA 2011 is replaced with |
|
Windows Production PCA 2023 |
|
Microsoft Windows Third Party Component CA 2012 is replaced with |
|
Microsoft Windows Third Party Component CA 2024 |
|
While it is recommended, Application Control policies which have Signer rules with TBS hash values listed in the table above do not need to be updated to trust the components signed by the new 2023 and 2024 CAs. Application Control will automatically infer trust of the new 2023 and 2024 CAs, and their TBS hash values, if your policy has rules trusting the current CAs.
For example, if your policy trusts the Windows Production PCA 2011 using the following rule, trust for the new Windows Production PCA 2023 will be automatically inferred. Signer elements like CertEKU, CertPublisher, FileAttribRef and CertOemId are preserved in the inferencing logic.
Signer Rule examples
Current Signer Rule
|
Inferred Signer Rule
|
The new handling logic also extends to deny signer rules in the policy. So, if you have denied components signed by the existing CAs, those components will continue to be denied once they are signed with the new 2023 and 2024 CAs.
Current Signer Rule
|
Inferred Signer Rule
|
Compatibility
Microsoft has serviced the TBS hash handling logic for the expiring CAs to all supported platforms where Application Control is supported according to the following table.
Windows OS |
Beginning this release and later releases |
Windows Server 2025 |
|
Windows 11, version 24H2 |
|
Windows Server, version 23H2 |
|
Windows 11, version 22H2 and 23H2 |
April 22, 2025—KB5055629 (OS 22621.5262 and 22631.5262) Preview |
Windows Server 2022 |
|
Windows 10, versions 21H2 and 22H2 |
May 13, 2025—KB5058379 (OS Builds 19044.5854 and 19045.5854) |
Windows 10, version 1809 and Windows Server 2019 |
|
Windows 10, version 1607 and Windows Server 2016 |
How to opt out
If you want to opt your systems out of the TBS hash inferencing logic performed by Application Control, set the following flag in policies: Disabled:Default Windows Certificate Remapping