CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ◇ Industry News & Leadership May 09, 2026

Let’s Encrypt Halts Certificate Issuance After Cross-Signed Root Certificate Incident

Cybersecurity News Archived May 09, 2026 ✓ Full text saved

Let’s Encrypt temporarily suspended all certificate issuance on May 8, 2026, after engineers identified a critical issue involving a cross-signed certificate linking the organization’s Generation X root to its upcoming Generation Y root infrastructure. The incident triggered a complete shutdown of issuance across both production and staging environments before services were restored within hours. At […] The post Let’s Encrypt Halts Certificate Issuance After Cross-Signed Root Certificate Inciden

Full text archived locally
✦ AI Summary · Claude Sonnet


    HomeCyber Security Let’s Encrypt Halts Certificate Issuance After Cross-Signed Root Certificate Incident By Guru Baran May 9, 2026 Let’s Encrypt temporarily suspended all certificate issuance on May 8, 2026, after engineers identified a critical issue involving a cross-signed certificate linking the organization’s Generation X root to its upcoming Generation Y root infrastructure. The incident triggered a complete shutdown of issuance across both production and staging environments before services were restored within hours. At 18:37 UTC on May 8, Let’s Encrypt engineers became aware of a potential incident and immediately halted all certificate issuance as a precautionary measure. The affected components included the production and staging ACME API endpoints (acme-v02.api.letsencrypt.org and acme-staging-v02.api.letsencrypt.org), as well as the production and staging portal environments hosted across two high-assurance datacenters. By 21:03 UTC, roughly two and a half hours later, the organization confirmed that issuance had resumed. However, as a direct result of the cross-signed certificate issue, all certificate generation was rolled back to the Generation X root. This rollback specifically impacts two ACME certificate profiles: tlsserver and shortlived. The timing of the incident is notable given that Let’s Encrypt had already announced three significant platform changes scheduled to go live on May 13, 2026, just five days away. Those changes include: The tlsserver ACME profile will begin issuing 45-day certificates as part of Let’s Encrypt’s phased roadmap to reduce certificate lifetimes from 90 days down to 45 days over the next two years. The tlsclient profile, used for TLS client authentication certificates, will be restricted exclusively to ACME accounts that have previously requested certificates from that profile. Full support for tlsclient certificates will end on July 8, 2026. The classic ACME profile was also scheduled to transition to Generation Y intermediates, which chain to the existing X1 and X2 roots a change designed to maintain broad compatibility across client environments. All three changes are currently live in Let’s Encrypt’s staging environment and remain on track for the May 13 production rollout, pending resolution of the root certificate issue. Let’s Encrypt has not disclosed details about whether any incorrectly issued certificates were distributed before issuance was halted. Administrators relying on automated ACME-based renewal workflows, particularly those using the tlsserver or shortlived profiles should monitor renewal logs closely and verify that certificates issued around the May 8 window chain correctly to the expected root. Updates and community support remain available at community.letsencrypt.org. Cybercriminals now enter through your suppliers instead of your front door – Free Webinar Tags cyber security cyber security news Copy URL Linkedin Twitter ReddIt Telegram Guru Baranhttps://cybersecuritynews.com Gurubaran KS is a cybersecurity analyst, and Journalist with a strong focus on emerging threats and digital defense strategies. He is the Co-Founder and Editor-in-Chief of Cyber Security News, where he leads editorial coverage on global cybersecurity developments. Trending News Malicious OpenClaw DeepSeek Skill Exploits Agentic AI Workflows to Deliver RAT and Stealer Critical Apache HTTP Server Flaw Exposes Millions of Servers to RCE Attacks New NWHStealer Delivery Chain Uses Bun Loader, Anti-VM Checks, and Encrypted C2 DOJ Sentences Two Americans to Prison for ALPHV BlackCat Attacks on U.S. Victims Critical MOVEit Vulnerabilities Enables Authentication Bypass Latest News Cyber Security News NVIDIA Data Breach Reportedly Exposes Personal Information of GeForce Users Cyber Security Critical Microsoft 365 Copilot Vulnerabilities Expose sensitive Information Cyber Security News New PamDOORa Backdoor Attacking Linux Systems to Steal SSH Credentials Cyber Security News Hackers Deploy Modular RAT With Credential Theft and Screenshot Capture Capabilities Cyber Security Škoda Security Incident Exposes Customers Data From Online Shop
    💬 Team Notes
    Article Info
    Source
    Cybersecurity News
    Category
    ◇ Industry News & Leadership
    Published
    May 09, 2026
    Archived
    May 09, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗