# Microsoft Defender's False Positive Alerts Strike DigiCert Root Certificates
A widespread detection issue in Microsoft Defender is causing legitimate DigiCert root certificates to be flagged as malware, resulting in system disruptions and potentially compromising security operations across thousands of organizations worldwide. The antivirus engine is incorrectly identifying DigiCert certificates as Trojan:Win32/Cerdigent.A!dha, a detection that has prompted both Microsoft and DigiCert to issue guidance to affected users.
## The Threat
Microsoft Defender began issuing alerts that DigiCert root certificates—which are fundamental to secure web communications and are installed by default on Windows systems—are malicious. In some cases, the antivirus software has gone further, actively removing legitimate certificates from affected machines, creating a cascading security problem that interferes with normal operations rather than protecting them.
The affected detection pattern is broad, meaning numerous users and organizations have received alerts simultaneously. This coordinated false-positive event has drawn immediate attention from security teams, system administrators, and enterprise organizations that rely on DigiCert certificates for:
Organizations affected by certificate removal have experienced connectivity issues, authentication failures, and broken TLS/SSL connections to legitimate services.
## Background and Context
### Understanding Certificate Authorities
DigiCert is one of the world's largest and most trusted Certificate Authorities (CAs), responsible for issuing digital certificates that enable encrypted communication across the internet. DigiCert serves enterprises, governments, and service providers with millions of active certificates in production environments.
Root certificates operate at the foundation of the public key infrastructure (PKI). When a Certificate Authority's root certificate is installed on a Windows system, the operating system trusts all certificates issued by that CA. This trust relationship is essential—without it, users would receive warnings or connection failures for legitimate encrypted connections.
DigiCert's certificates are ubiquitous in enterprise and consumer environments. The company issues certificates for:
### Why This Is Unusual
Microsoft Defender false positives are not uncommon, but they rarely affect trusted root certificate authorities. Root CA certificates are typically added to Windows through:
The fact that Microsoft's own antivirus engine is flagging a widely-trusted root CA as malware represents a significant operational failure.
## Technical Details
### The Detection and Its Impact
The detection signature Trojan:Win32/Cerdigent.A!dha appears to be a behavioral or heuristic-based alert rather than a signature-based one (where specific malware code is matched against a known database). This suggests Microsoft's detection engine identified something in the certificate or its associated properties that matched a pattern associated with malicious activity.
Key observations:
| Aspect | Details |
|--------|---------|
| Affected Component | DigiCert root certificates installed on Windows systems |
| Detection Name | Trojan:Win32/Cerdigent.A!dha |
| Detection Type | Likely behavioral/heuristic analysis |
| Impact | Alerts, certificate removal, connection failures |
| Affected Systems | Windows systems with Defender enabled and DigiCert roots installed |
### Why This Constitutes a False Positive
DigiCert's certificates are:
The certificates themselves contain no malicious code. They are mathematical constructs used to verify identity and establish encrypted communication. No known threat actor uses legitimate CA root certificates as a distribution mechanism for malware.
### Root Cause Uncertainty
Microsoft and DigiCert have not yet publicly disclosed the exact reason for the false positive. Possibilities include:
## Implications for Organizations
### Immediate Risks
1. Connectivity Disruption
Organizations with Defender set to automatically quarantine or remove detected threats may experience:
2. Security Operations Impact
Security teams face difficult decisions:
3. Certificate Chain Validation
With root certificates removed, downstream certificates issued by DigiCert also fail validation, creating a chain reaction of authentication failures.
### Affected Services
Any service relying on DigiCert certificates is potentially impacted:
## Recommendations
### For System Administrators
Immediate Actions:
1. Verify the status — Check if your systems have received the false-positive alert
2. Review Defender quarantine logs — Search for the Cerdigent.A detection to identify affected machines
3. Restore certificates if removed — Manually re-import DigiCert root certificates if they were quarantined
4. Check connectivity — Test connections to critical services using DigiCert certificates
Configuration Changes:
### For Security Teams
1. Document the incident — Log which systems were affected and how many alerts were generated
2. Assess impact — Review authentication failures and connection issues occurring during the false-positive period
3. Update detection baselines — Adjust monitoring to account for this event and prevent similar false positives from blindsiding your team
4. Strengthen CA validation processes — Implement additional verification before trusting threat detections involving certificates from major CAs
### For Organizations Using DigiCert Services
## What's Next
Microsoft and DigiCert are actively coordinating on a fix. Users should expect:
Until the fix is released, organizations should carefully balance security and availability, considering temporary Defender exclusions for DigiCert certificates while maintaining other protections.
This incident serves as a reminder that security tools themselves require oversight and verification. False positives from trusted security vendors can sometimes pose greater operational risk than the threats they're designed to prevent.
---
*For ongoing cybersecurity news and threat intelligence, follow HackWire's coverage of certificate authority incidents, antivirus reliability, and enterprise security operations.*