Skip to content

Interpreting the script outputs #13

@cjee21

Description

@cjee21

Check UEFI PK, KEK, DB and DBX.cmd

The purpose of this script is to check the contents of the PK, KEK, DB and DBX UEFI variables.

For the PK, KEK and DB sections, certificates that are present will be indicated by a green checkmark while certificates that are known but not present will be indicated by a red cross. (revoked: True) at the end of a cert that is present indicates that that cert is found in the DBX as well which means it is effectively revoked. The green check marks and red crosses do not mean good and bad but merely indicates whether a cert is present.

A Windows-only PC with the most secure configuration may have an output similar to the following:

Current UEFI KEK
√ Microsoft Corporation KEK CA 2011 (revoked: False)
√ Microsoft Corporation KEK 2K CA 2023 (revoked: False)                                                                                                                                                                                        

Current UEFI DB
√ Microsoft Windows Production PCA 2011 (revoked: True)
X Microsoft Corporation UEFI CA 2011
√ Windows UEFI CA 2023 (revoked: False)
X Microsoft UEFI CA 2023
X Microsoft Option ROM UEFI CA 2023

or the following:

Current UEFI KEK
√ Microsoft Corporation KEK CA 2011 (revoked: False)
√ Microsoft Corporation KEK 2K CA 2023 (revoked: False)                                                                                                                                                                                         

Current UEFI DB
X Microsoft Windows Production PCA 2011
X Microsoft Corporation UEFI CA 2011
√ Windows UEFI CA 2023 (revoked: False)
X Microsoft UEFI CA 2023
X Microsoft Option ROM UEFI CA 2023

The 'Default' variables indicate which cert the system ships with and is useful for knowing what would happen if you reset the UEFI Secure Boot variables to default in the UEFI setup. Not all systems expose these 'default' variables. Default variables can only be updated by UEFI updates from the device manufacturer.

For the DBX section, the script checks if the current DBX content matches the latest DBX update file from Microsoft. It also checks if the SVNs that are in the DBX are equal or higher than the values publicly published by Microsoft as the latest.

For a PC that is secure and completely up-to-date, all values will be shown in green as follows:

Image

SUCCESS: 431 successes detected indicates the result of comparing the DBX contents with the DBX update bin file provided by Microsoft. In this case, all 431 entries from the October 2025 patch Tuesday are successfully updated in the DBX.

Check Windows state.cmd

The purpose of this script is to check the current state of the specific Windows installation in regards to Secure Boot related items especially regarding the migration to 2023 signed boot manager. The first section checks the registry keys while below it, the version, signature cert issuer CA and SVN of Windows Boot Manager (bootmgfw.efi EFI Application and bootmgr.efi Windows Boot Application) located in the EFI System Partition are checked and displayed.

An up-to-date system that has completed the migration to 2023 certs and boot manager automatically via Windows Update from January 2026 onwards should have an output similar to the following:

Windows version: 25H2 (Build 26200.8037)

UEFISecureBootEnabled    : 1
AvailableUpdates         : 0x0000
UEFICA2023Status         : Updated
WindowsUEFICA2023Capable : Windows UEFI CA 2023 cert is in DB, system is starting from 2023 signed boot manager

bootmgfw version         : 10.0.26100.30227 (WinBuild.160101.0800)
bootmgfw raw version     : 10.0.28000.317
bootmgfw signature CA    : Windows UEFI CA 2023
bootmgfw SVN             : 7.0

bootmgr version          : 10.0.26100.30227 (WinBuild.160101.0800)
bootmgr raw version      : 10.0.28000.317
bootmgr signature CA     : Microsoft Windows Production PCA 2011
bootmgr SVN              : 7.0

memtest version          : 10.0.26100.1 (WinBuild.160101.0800)
memtest raw version      : 10.0.26100.7920
memtest signature CA     : Microsoft Windows Production PCA 2011

Only the bootmgfw.efi need to be signed with a cert issued by Windows UEFI CA 2023 as this is the EFI Application that is directly loaded by the UEFI. The other two EFI files are Windows Boot Applications that are not directly loadable by the UEFI. One should ensure that the bootmgfw signature CA is Windows UEFI CA 2023 before revoking the Windows Production PCA 2011 and that the SVNs are the latest before attempting to update the Bootmgr SVN in the DBX to the latest.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions