SSL.com Rotates Root Certificate, Potential Validation Issues for Clients
What Happened — SSL.com announced a scheduled rotation of its root certificate on May 5 2026. The change is routine PKI maintenance but can cause temporary trust failures for systems that have not yet imported the new root.
Why It Matters for TPRM —
- Third‑party services that rely on SSL.com‑issued certificates may experience connection errors or service interruptions.
- Un‑updated trust stores can lead to downtime, affecting business continuity and SLA compliance.
Who Is Affected — SaaS platforms, financial services, healthcare applications, and any organization that uses SSL.com certificates for TLS termination.
Recommended Actions — Verify that all internal and third‑party systems trust the new SSL.com root, update certificate stores, and test critical integrations after the rotation.
Technical Notes — The rotation involves publishing a new root CA and deprecating the old one; no CVEs are involved. Only TLS‑protected traffic is impacted. Source: SANS Internet Storm Center