Symantec Legacy Root Distrust Dates
Since DigiCert acquired Symantec’s Website Security and Related PKI Solutions, we have been working fervently with thousands of customers and site administrators to help maintain system operability and avoid downtime due to impacted certificates.
To better understand distrust, it is important to remember that various browsers and platforms use independent trust stores. This results in differing dates for distrusted certificates depending on what Root Program the system is utilizing.
This page will periodically be updated with the latest information and certificate chain details as it becomes available. We invite you to bookmark this page and use it for reference whenever needed.
The reference table below will help you determine impact and resolution options for the impacted certificate chains:
Platform | Root | Serial Number | Product | Distrust Date |
Mozilla Firefox | VeriSign Class 3 Public Primary Certification Authority - G5 | 18DAD19E267DE8BB4A2158CDCC6B3B4A |
TLS / SSL | December 11, 2018 |
VeriSign Class 3 Public Primary Certification Authority - G4 | 2F80FE238C0E220F486712289187ACB3 |
TLS / SSL | December 11, 2018 | |
GeoTrust Primary Certification Authority | 18ACB56AFD69B6153A636CAFDAFAC4A1 |
TLS / SSL | December 11, 2018 | |
GeoTrust Global CA | 023456 |
TLS / SSL | December 11, 2018 | |
GeoTrust Universal CA | 01 |
TLS / SSL | December 11, 2018 | |
GeoTrust Universal CA 2 | 01 |
TLS / SSL | December 11, 2018 | |
VeriSign Universal Root Certification Authority | 401AC46421B31321030EBBE4121AC51D |
TLS / SSL | August 2022 | |
Client (S/MIME) | March 2021 | |||
VeriSign Class 1 Public Primary Certification Authority - G3 | 008B5B75568454850B00CFAF3848CEB1A4 |
Client (S/MIME) | August 30, 2022 | |
VeriSign Class 2 Public Primary Certification Authority - G3 | 6170CB498C5F984529E7B0A6D9505B7A |
Client (S/MIME) | August 30, 2022 | |
Symantec Class 1 Public Primary Certification Authority - G4 | 216E33A5CBD388A46F2907B4273CC4D8 |
Client (S/MIME) | August 30, 2022 | |
Symantec Class 2 Public Primary Certification Authority - G4 | 34176512403BB756802D80CB7955A61E |
Client (S/MIME) | August 30, 2022 | |
Symantec Class 1 Public Primary Certification Authority - G6 | 243275F21D2FD20933F7B46ACAD0F398 |
Client (S/MIME) | August 30, 2022 | |
Symantec Class 2 Public Primary Certification Authority - G6 | 64829EFC371E745DFC97FF97C8B1FF41 |
Client (S/MIME) | August 30, 2022 | |
VeriSign Class 3 Public Primary Certification Authority - G3 | 009B7E0649A33E62B9D5EE90487129EF57 |
TLS / Client (S/MIME) | Dec 14, 2020 | |
Oracle Opera / JAVA | GeoTrust Global CA | 023456 |
TLS / SSL | April 16, 2019 |
GeoTrust Primary Certification Authority | 18ACB56AFD69B6153A636CAFDAFAC4A1 |
TLS / SSL |
April 16, 2019 | |
GeoTrust Primary Certification Authority - G2 | 3CB2F4480A00E2FEEB243B5E603EC36B |
TLS / SSL |
April 16, 2019 | |
GeoTrust Primary Certification Authority - G3 | 15AC6E9419B2794B41F627A9C3180F1F |
TLS / SSL |
April 16, 2019 | |
GeoTrust Universal CA | 01 |
TLS / SSL |
April 16, 2019 | |
thawte Primary Root CA | 344ED55720D5EDEC49F42FCE37DB2B6D |
TLS / SSL |
April 16, 2019 | |
thawte Primary Root CA - G2 | 35FC265CD9844FC93D263D579BAED756 |
TLS / SSL |
April 16, 2019 | |
thawte Primary Root CA - G3 | 600197B746A7EAB4B49AD64B2FF790FB |
TLS / SSL |
April 16, 2019 | |
thawte Premium Server CA | 01 |
TLS / SSL | April 16, 2019 | |
VeriSign Universal Root Certification Authority | 401AC46421B31321030EBBE4121AC51D |
Client (S/MIME) | March 31, 2023 | |
Apple | VeriSign Class 3 Public Primary Certification Authority - G4 | 2F80FE238C0E220F486712289187ACB3 |
TLS / SSL | July 20, 2018 |
VeriSign Class 3 Public Primary Certification Authority - G5 | 18DAD19E267DE8BB4A2158CDCC6B3B4A |
TLS / SSL | July 20, 2018 | |
Code Signing |
September 2, 2021 | |||
Symantec Class 3 Public Primary Certification Authority - G4 | 4C79B59A289C763164F58944D09102DE |
TLS / SSL | July 20, 2018 | |
Symantec Class 3 Public Primary Certification Authority - G6 | 65637185D36F45C68F7F31F909879282 |
TLS / SSL | July 20, 2018 | |
GeoTrust Global CA | 023456 |
TLS / SSL | July 20, 2018 | |
Client (S/MIME) | September 2, 2021 | |||
VeriSign Class 1 Public Primary Certification Authority - G3 | 008B5B75568454850B00CFAF3848CEB1A4 |
Client (S/MIME) | January 31, 2022 | |
VeriSign Class 2 Public Primary Certification Authority - G3 | 6170CB498C5F984529E7B0A6D9505B7A |
Client (S/MIME) | January 31, 2022 | |
VeriSign Universal Root Certification Authority | 401AC46421B31321030EBBE4121AC51D |
Client (S/MIME) | January 31, 2022 | |
thawte Primary Root CA | 344ED55720D5EDEC49F42FCE37DB2B6D |
TLS / SSL | July 20, 2018 | |
Client (S/MIME) | September 2, 2021 | |||
Code Signing | September 2, 2021 | |||
GeoTrust Primary Certification Authority | 18ACB56AFD69B6153A636CAFDAFAC4A1 |
TLS / SSL | July 20, 2018 | |
Client (S/MIME) | September 2, 2021 | |||
thawte Primary Root CA - G2 | 35FC265CD9844FC93D263D579BAED756 |
TLS / SSL | July 20, 2018 | |
Client (S/MIME) | April 2021 | |||
thawte Primary Root CA - G3 | 600197B746A7EAB4B49AD64B2FF790FB |
TLS / SSL | July 20, 2018 | |
Client (S/MIME) | September 2, 2021 | |||
Code Signing | September 2, 2021 | |||
GeoTrust Primary Certification Authority - G2 | 3CB2F4480A00E2FEEB243B5E603EC36B |
TLS / SSL | July 20, 2018 | |
Client (S/MIME) | September 2, 2021 | |||
GeoTrust Primary Certification Authority - G3 | 15AC6E9419B2794B41F627A9C3180F1F |
TLS / SSL | July 20, 2018 | |
Client (S/MIME) | September 2, 2021 | |||
Symantec Class 1 Public Primary Certification Authority - G4 | 216E33A5CBD388A46F2907B4273CC4D8 |
Client (S/MIME) | Q1 2022 | |
Symantec Class 1 Public Primary Certification Authority - G6 | 243275F21D2FD20933F7B46ACAD0F398 |
Client (S/MIME) | January 31, 2022 | |
Symantec Class 2 Public Primary Certification Authority - G4 | 34176512403BB756802D80CB7955A61E |
Client (S/MIME) | Q1 2022 | |
Symantec Class 2 Public Primary Certification Authority - G6 | 64829EFC371E745DFC97FF97C8B1FF41 |
Client (S/MIME) | January 31, 2022 | |
VeriSign Class 3 Public Primary Certification Authority - G3 | 009B7E0649A33E62B9D5EE90487129EF57 |
TLS/ SSL / Client (S/MIME) | September 2, 2021 | |
Microsoft IE | Symantec Class 3 Public Primary Certification Authority - G6 | 65637185D36F45C68F7F31F909879282 |
TLS / SSL /Client | September 30, 2018 |
Symantec Class 3 Public Primary Certification Authority - G4 | 4C79B59A289C763164F58944D09102DE |
TLS / SSL | January 31, 2019 | |
VeriSign Class 3 Public Primary Certification Authority - G4 | 2F80FE238C0E220F486712289187ACB3 |
TLS / SSL | January 31, 2019 | |
VeriSign Class 3 Public Primary Certification Authority - G5 | 18DAD19E267DE8BB4A2158CDCC6B3B4A |
TLS / SSL | May 21, 2019 | |
thawte Primary Root CA - G2 | 35FC265CD9844FC93D263D579BAED756 |
TLS / SSL | September 30, 2018 | |
Client (S/MIME) | Feb 23, 2021 | |||
GeoTrust Primary Certification Authority - G2 | 3CB2F4480A00E2FEEB243B5E603EC36B |
TLS / SSL | January 1, 2020 | |
VeriSign Universal Root Certification Authority | 401AC46421B31321030EBBE4121AC51D |
TLS / SSL | May 21, 2019 | |
Client (S/MIME) | March 31, 2023 | |||
thawte Primary Root CA - G3 | 600197B746A7EAB4B49AD64B2FF790FB |
TLS / SSL | May 21, 2019 | |
Client (S/MIME) | Feb 23, 2021 | |||
GeoTrust Primary Certification Authority - G3 | 15AC6E9419B2794B41F627A9C3180F1F |
TLS / SSL | May 21, 2019 | |
Client (S/MIME) | Feb 23, 2021 | |||
GeoTrust Primary Certification Authority | 18ACB56AFD69B6153A636CAFDAFAC4A1 |
TLS / SSL | May 21, 2019 | |
Client (S/MIME) | Feb 23, 2021 | |||
thawte Primary Root CA | 344ED55720D5EDEC49F42FCE37DB2B6D |
TLS / SSL | May 21, 2019 | |
Client (S/MIME) | Feb 23, 2021 | |||
GeoTrust Global CA | 023456 |
TLS / SSL | January 1, 2020 | |
Client (S/MIME) | Feb 23, 2021 | |||
GeoTrust Universal CA | 1 |
TLS / SSL | September 30, 2018 | |
Client (S/MIME) | Feb 23, 2021 | |||
Verisign Class 1 Public Primary Certification Authority - G3 | 008B5B75568454850B00CFAF3848CEB1A4 |
Client (S/MIME) | March, 2023 | |
Code Signing | April 1, 2021 | |||
Verisign Class 2 Public Primary Certification Authority - G3 | 6170CB498C5F984529E7B0A6D9505B7A |
Client (S/MIME) | March, 2023 | |
Code Signing | Feb 23, 2021 | |||
Symantec Class 2 Public Primary Certification Authority - G4 | 34176512403BB756802D80CB7955A61E |
Client (S/MIME) | March, 2023 | |
Code Signing | Feb 23, 2021 | |||
Symantec Class 1 Public Primary Certification Authority - G6 | 243275F21D2FD20933F7B46ACAD0F398 |
Client (S/MIME) | March, 2023 | |
Code Signing | April 1, 2021 | |||
Symantec Class 2 Public Primary Certification Authority - G6 | 64829EFC371E745DFC97FF97C8B1FF41 |
Client (S/MIME) | March, 2023 | |
Code Signing | April 1, 2021 | |||
GeoTrust Global CA 2 | 01 |
TLS / SSL | August 1, 2019 | |
Client (S/MIME) | August 1, 2019 | |||
Code Signing | August 1, 2019 | |||
VeriSign Class 3 Public Primary Certification Authority - G3 | 009B7E0649A33E62B9D5EE90487129EF57 |
Client (S/MIME) / Code Signing | Feb 23, 2021 |
The Root Programs listed here are some of the most ubiquitious, however there are others that may be in use within your organization.
Symantec code signing certificates issued after February 23, 2021, will not be publicly trusted in the Microsoft root store. Certificates issued before that date will be publicly trusted, but when they expire, they must be renewed from DigiCert intermediate CA and root certificate hierarchy.
How does this affect me?
If your Symantec code signing certificates were issued before February 23, 2021:
If your Symantec code signing certificates were issued after February 23, 2021:
Why is this happening?
Legacy Symantec root certificates are being removed from most browsers, meaning certificates issued from those roots are no longer publicly trusted.
Microsoft is not removing the root certificates, but they are implementing a “not before” date for trust—meaning that certificates that link to the root and were issued before that date will remain publicly trusted, but those linking to the root and issued after that date will not be trusted.
On September 2, 2021, Apple will distrust 9 legacy Symantec root certificates, previously scheduled to be distrusted in April 2021. Root distrust means all certificates issued from these roots and all objects signed from those certificates will no longer be trusted on macOS and iOS.
We apologize for any inconvenience. If you have additional questions, please contact your account manager or our support team.