LIVE NEWSROOM · --:-- · May 24, 2026
A LIBRARY FOR SECURITY RESEARCHERS

Microsoft Defender Removes Trusted DigiCert Root Certificates Worldwide

Post on X LinkedIn
Microsoft Defender Removes Trusted DigiCert Root Certificates Worldwide

A faulty Microsoft Defender signature update deployed on April 30, 2026 has been flagging two legitimate DigiCert root CA certificates as Trojan:Win32/Cerdigent.A!dha, causing Microsoft Defender Antivirus to silently remove them from Windows AuthRoot certificate stores on affected machines. Microsoft issued a fix in Security Intelligence update 1.449.430.0, which also automatically restores previously deleted certificates.

// 01 Microsoft Defender DigiCert False Positive: Technical Details

The flawed detection was introduced in Security Intelligence update 1.449.424.0, released April 30, 2026. The update added a Trojan:Win32/Cerdigent.A!dha signature intended to target malicious or misissued certificates. Instead, the signature incorrectly matched the cryptographic thumbprints of two long-trusted DigiCert Public CA root certificates:

| Certificate Thumbprint | Status | |————————|——–| | 0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43 | Incorrectly flagged and removed | | DDFB16CD4931C973A2037D3FC83A4D7D775D05E4 | Incorrectly flagged and removed |

When Defender detected these certificates, it removed them from the Windows AuthRoot certificate store at:


HKLMSOFTWAREMicrosoftSystemCertificatesAuthRootCertificates

The AuthRoot store is the Windows system-level container for trusted root CA certificates. Any root CA entry removed from this store causes Windows to stop trusting all certificates issued under that CA hierarchy — even if the endpoint certificates themselves are valid and unexpired. In enterprise environments, this typically manifests immediately as HTTPS connection failures, code-signing validation errors, S/MIME email decryption failures, and broken authentication in any service presenting a DigiCert-issued TLS certificate.

There is no associated CVE number for this incident. This is a Defender signature false positive, not a vulnerability in Windows or in the DigiCert certificate infrastructure. DigiCert has not been breached; the certificates flagged are legitimate root CAs that have been in the Windows trust store for years.

Reports began surfacing on May 3, 2026, as administrators across Windows 11 and Windows Server environments started receiving Cerdigent threat detection alerts. In many cases, Defender was simultaneously alerting on and attempting to remediate a “threat” that was in fact the operating system’s own certificate infrastructure.

// 02 Exploitation and Threat Landscape

This is a false positive event, not active exploitation. No threat actor is involved. However, the operational impact is real and immediate: organizations running Microsoft Defender on Windows endpoints or servers may have had root CA certificates silently removed without administrator intervention, depending on their Defender quarantine policy configuration.

Wide distribution of the update across enterprise fleets means IT teams may encounter trust failures across a large number of systems simultaneously. Services that validate DigiCert-signed certificates — including financial platforms, SaaS vendors, internal PKI-dependent applications, and enterprise software — can fail for end users even when the remote server’s certificate is entirely valid. The failure mode looks identical to a certificate misconfiguration or a TLS negotiation failure, which can delay root cause identification.

Community reports noted that affected systems continued displaying Cerdigent detection alerts even after administrators attempted to quarantine or remove the flagged “threat,” because Defender was re-detecting the same legitimate certificate store entries that Windows itself relies on for system operations. The Microsoft Q&A forum was flooded with identical reports within hours of the update going wide.

// 03 Who Is Affected

Any Windows system running Microsoft Defender Antivirus that received Security Intelligence update 1.449.424.0 and has not yet applied 1.449.430.0 is potentially affected. This includes:

  • Windows 10 and Windows 11 (consumer and enterprise editions)
  • Windows Server editions with Defender Antivirus active
  • Managed enterprise endpoints under any Microsoft Defender for Endpoint policy that permits automatic definition updates
  • Azure Virtual Machines with Defender extensions enabled

Systems in air-gapped or restricted environments that manually distribute signature updates may have been exposed if administrators deployed the 1.449.424.0 definitions before the fix was available.

// 04 What You Should Do Right Now

  • Update Defender definitions immediately. Navigate to Windows Security > Virus and threat protection > Protection updates > Check for Updates to pull Security Intelligence update 1.449.430.0 or later. On managed endpoints, force a definition update via Intune, WSUS, or your MDM platform. The fix automatically restores previously deleted certificates.
  • Verify the Security Intelligence version fleet-wide. Run the following from an administrative PowerShell session:

powershell Get-MpComputerStatus | Select-Object AntivirusSignatureVersion, AntivirusSignatureLastUpdated

The version must read 1.449.430.0 or higher. Any endpoint showing 1.449.424.0 through 1.449.429.x should be considered affected.

  • Confirm both DigiCert root certificates are present. After updating, verify the certs were restored:

powershell $thumbprints = @( '0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43', 'DDFB16CD4931C973A2037D3FC83A4D7D775D05E4' ) foreach ($thumb in $thumbprints) { $cert = Get-ChildItem Cert:LocalMachineAuthRoot -ErrorAction SilentlyContinue | Where-Object { $_.Thumbprint -eq $thumb } if ($cert) { Write-Host "$thumb PRESENT" -ForegroundColor Green } else { Write-Host "$thumb MISSING — REMEDIATE" -ForegroundColor Red } }

If either certificate remains missing after applying the fix, reimport it from DigiCert’s root CA repository or via Microsoft’s Certificate Trust List (CTL) automatic update service.

  • Audit application and event logs for scope. In Event Viewer, check Windows Logs > Application and the Defender operational log at Applications and Services Logs > Microsoft > Windows > Windows Defender > Operational for Cerdigent detection events. Use the timestamps to identify which endpoints removed the certificates and when.
  • Notify downstream teams. If your organization operates services presenting DigiCert-issued TLS certificates — or relies on DigiCert-signed code for software deployment — alert helpdesk and network teams to correlate any reported HTTPS, authentication, or signing failures with this root cause before escalating as separate incidents.
  • Check Windows Server instances separately. Server-side certificate stores may require explicit verification, particularly on IIS, Exchange, or other services where certificate changes directly affect service availability. Prioritize servers over workstations if resources are constrained.

// 05 Detection and Verification

To confirm Defender signature status and certificate presence across a fleet, use the following PowerShell one-liner compatible with remote execution via Invoke-Command:


# Run on each endpoint or via Invoke-Command -ComputerName
$status = Get-MpComputerStatus
$certs  = Get-ChildItem Cert:LocalMachineAuthRoot -ErrorAction SilentlyContinue
$missing = @(
  '0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43',
  'DDFB16CD4931C973A2037D3FC83A4D7D775D05E4'
) | Where-Object { $_ -notin ($certs | Select-Object -ExpandProperty Thumbprint) }

[PSCustomObject]@{
  Computer       = $env:COMPUTERNAME
  SigVersion     = $status.AntivirusSignatureVersion
  SigDate        = $status.AntivirusSignatureLastUpdated
  MissingCerts   = ($missing -join ', ') -or 'None'
}

Microsoft’s Security Intelligence update release notes confirm 1.449.430.0 as the remediated version. For Defender for Endpoint customers, the MDE portal’s Device health > Antivirus blade displays current definition versions across managed endpoints.

// 06 Conclusion

The Trojan:Win32/Cerdigent.A!dha false positive demonstrates how a single Defender signature update can silently break certificate trust chains across an entire enterprise fleet. Apply Security Intelligence update 1.449.430.0 immediately, verify both DigiCert root certificates are present in AuthRoot, and prioritize server-side certificate stores where trust failures carry the highest availability impact.

For any query contact us at contact@cipherssecurity.com

    TE
    Team Ciphers Security

    The Ciphers Security editorial team — practitioners covering daily threat intel, CVE deep-dives, and hands-on cybersecurity research. About us →

    Previous Microsoft tests modern Windows Run, says it's faster than legacy dialog Next CISA AA26-097A: CyberAv3ngers Target 5,219 Exposed Rockwell Allen-Bradley PLCs

    Latest News

    CISA Contractor Leaked AWS GovCloud Keys on GitHub for Six Months A Nightwing contractor exposed CISA's AWS GovCloud credentials and internal system keys on a public GitHub repo for… Ghostwriter Deploys Prometheus Phishing Lures Against Ukraine Government Entities Belarus-aligned APT Ghostwriter (UAC-0057) is targeting Ukrainian government with Prometheus-themed phishing delive… Screening Serpens: Iranian APT Fuses AppDomainManager Hijacking with New RATs in 2026 Espionage Campaign Iran-aligned Screening Serpens is using AppDomainManager hijacking and new RAT variants — MiniJunk and MiniUpdate —… CVE-2026-9082: Critical Drupal SQL Injection Under Attack on Thousands of Sites CVE-2026-9082 is an unauthenticated SQL injection in Drupal Core affecting PostgreSQL deployments across versions 8… CVE-2026-20182: Cisco Catalyst SD-WAN CVSS 10.0 Auth Bypass Actively Exploited CVE-2026-20182 (CVSS 10.0 Critical) is a Cisco Catalyst SD-WAN Controller auth bypass exploited by UAT-8616. Metasp… Kali365 PhaaS Kit Bypasses Microsoft 365 MFA via Device Code Phishing — FBI Warning FBI warns Kali365 PhaaS kit steals Microsoft 365 OAuth tokens, bypassing MFA. Hundreds of orgs compromised daily. A… Megalodon: Supply Chain Attack Backdoors 5,561 GitHub Repos in Six Hours via CI/CD Workflow Injection Megalodon supply chain attack compromised 5,561 GitHub repos in 6 hours on May 18, injecting malicious CI/CD workfl… Stolen Gemini API Keys and AI Fraud: How 'Quantum Patriot' Drained Crypto Wallets via Fake QAnon Content A Russian-speaking fraudster used 73 stolen Gemini API keys and an automated Python pipeline to generate fake QAnon…
    Scroll to Top
    Ad