HomeIntelligenceBrief
BREACH BRIEF🟢 Low Advisory

SSL.com Rotates Root Certificate, Raising Potential Validation Issues for Clients

SSL.com performed a scheduled root certificate rotation on May 5 2026. Organizations that rely on SSL.com‑issued TLS certificates must update their trust stores to avoid connection errors. This advisory highlights the operational impact for third‑party risk managers.

LiveThreat™ Intelligence · 📅 May 05, 2026· 📰 isc.sans.edu
🟢
Severity
Low
AD
Type
Advisory
🎯
Confidence
High
🏢
Affected
3 sector(s)
Actions
3 recommended
📰
Source
isc.sans.edu

SSL.com Rotates Root Certificate, Potential Validation Issues for Clients

What Happened — SSL.com announced a scheduled rotation of its root certificate on May 5 2026. The change is routine PKI maintenance but can cause temporary trust failures for systems that have not yet imported the new root.

Why It Matters for TPRM

  • Third‑party services that rely on SSL.com‑issued certificates may experience connection errors or service interruptions.
  • Un‑updated trust stores can lead to downtime, affecting business continuity and SLA compliance.

Who Is Affected — SaaS platforms, financial services, healthcare applications, and any organization that uses SSL.com certificates for TLS termination.

Recommended Actions — Verify that all internal and third‑party systems trust the new SSL.com root, update certificate stores, and test critical integrations after the rotation.

Technical Notes — The rotation involves publishing a new root CA and deprecating the old one; no CVEs are involved. Only TLS‑protected traffic is impacted. Source: SANS Internet Storm Center

📰 Original Source
https://isc.sans.edu/diary/rss/32956

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.