Defender Misflags DigiCert Root Certificates, Breaking Windows SSL Trust


TL;DR

  • False Positive: A Microsoft Defender signature update on April 30, 2026 misclassified two legitimate DigiCert root certificates as Trojan:Win32/Cerdigent.A!dha.
  • Quarantine Impact: Defender quarantined the DigiCert Assured ID Root CA and Trusted Root G4 entries, breaking SSL/TLS validation on affected endpoints.
  • Corrective Update: Microsoft fixed the detection in Security Intelligence version 1.449.430.0 and restored removed certificates with version 1.449.431.0.
  • Residual Exposure: Endpoints whose update policies blocked the corrective definition will keep failing SSL/TLS validation until administrators deploy 1.449.430.0 or later.

Microsoft on April 30 released a Defender signature update that misclassified two legitimate DigiCert root certificates as Trojan:Win32/Cerdigent.A!dha, quarantining the certificates from the Windows trust store and breaking SSL/TLS validation on affected endpoints before Microsoft shipped a fix.

Both DigiCert Assured ID Root CA and DigiCert Trusted Root G4 were caught by the faulty antimalware signature update, in some cases removing their entries from Windows. Microsoft fixed the false positive in Security Intelligence update version 1.449.430.0, with version 1.449.431.0 also restoring the removed certificates on affected systems.