Thank you for reaching out.
I recommend not to roll back the updates.
Uninstalling KB5066791 (Windows 10) or KB5066835 (Windows 11) might make the issue disappear temporarily, but it’s not recommended because:
- These updates include critical security fixes.
- Rolling them back exposes systems to vulnerabilities and compliance risks.
- Microsoft’s direction is to move away from legacy cryptographic APIs, so this problem will return in future updates.
Workarounds you can try instead
Upgrade the .NET Framework
Move from 4.5.2 to at least 4.6 or later. Modern cryptographic APIs introduced in 4.6 handle CNG keys correctly.
Re-import certificates using a CSP provider
If code changes are not immediately possible, you can re-import the certificate with a legacy CSP key provider. This is a temporary workaround and not ideal for security.
Use X509KeyStorageFlags when loading PFX files
If your app loads certificates from PFX, try adding flags like MachineKeySet or Exportable. This can resolve access issues in some service contexts.
Check private key permissions
Ensure the application’s process identity has the correct ACL permissions on the private key in the certificate store. The update enforces stricter checks.
Update middleware for hardware-backed keys
If using HSMs or smart cards, confirm that the vendor’s middleware is updated and compatible with the new security changes.
Plan for application update
Even if temporary fixes help, the long-term solution is to update the application to use modern APIs that support CNG keys. This aligns with Microsoft’s security roadmap.
Let me know if you need any further help with this. We'll be happy to assist.
If you find this helpful, please mark this as answered.