Jump to content

How to disable Kaspersky root authority certificate and all that depends on it


Recommended Posts

Posted

No matter how well-intentioned, I never trust vendor-provided Trusted Root CA Certificates.

How do I disable all Kaspersky Security Cloud features that would rely on this certificate, and prevent Kaspersky from re-inserting that certificate into the Trusted Root CA Certificates Store (Windows)?

thank you.

Posted

Hi,

Welcome.

Settings > Additional > Network > Do not scan encrypted connections

Posted

I already selected the option “Do not scan encrypted connections".

At restart, Kaspersky still re-added that trusted root CA certificate.

How do I prevent Kaspersky from re-adding the certificate, regardless of whether it would plan to USE that certificate?

thanks.

Posted

Try this, disabling:

  • Do not scan encrypted connections
  • Inject script into web traffic…
  • Delete Kaspersky Protection add-on in all browsers
  • Delete Kaspersky Root Certificate installed in Windows, to do this run certml.msc and:

In Action → Search Certificates → type kaspersky → click on button Search Now → once found → mouse right click → Remove / Delete

 

 

 

Posted

Unfortunately, I've tried all of that, and at each reboot, Kaspersky puts that root certificate back into the Trusted Root CA Certificates (machine) store. That's really unacceptable. AVG went through a public nightmare with this years ago, and if I recall correctly, they made it easier to control.

Why does Kaspersky insist on making this (bad, IMNSHO) security trade-off per-force instead of with informed consent as an option?

And, most importantly, how do I really un-do this?

thank you.

Posted

In this Community We can’t help You, You better contact to Kaspersky Support via “My Kaspersky” service.

 

Anyway probably it can’t be disabled, since some of the main security modules/features are depending of filtering the traffic and some of them probably need this Root Certificate.

kill.Method
Posted

Good evening!

My name is Mark. I have seen a couple of posts in various boards now that carry the same theme: I don’t trust vendor root certificates --   I want to play devil’s advocate here and share some experience. 

Firstly, let’s understand that my trust levels went down this last 12 months--and its open-sourced programs that I scrutinize the most. After dealing with devices that had bullcrap certificates loaded (stolen developer certificates) to give access to surveillance and device hijacking software that made it near impossible to manage one’s own device…. I choose vendor. Vendors are at least operating with clear intentions: To make money. If you think a business exists for you, go back to basics. Business exists to make money. A vendor selling IT security will not last long if it is not delivering the product that it advertises and there are more than enough watchdogs and reviewers to make sure that conversation would be loud and clear. 

Open-sourced software….we’re still dealing with the growing pains. For every great thing software can do for us (open sourced or no) it can be used in an equally malicious fashion. We still have ethical problems that we are facing in an environment where anybody can access the sources...and alter them...or worse, alter the SDK that comes with.

 

My two cents. Thank you Kaspersky. Here are the keys to my banking SSL...please. 

Posted

@kill.Method Your point, that open source software has not necessarily proven to be more secure than closed source/ commercial, is well-taken.

However, this isn't “do I want a Trusted Root CA Certificate from a vendor's piece of software which, if compromised (as we've seen happen repeatedly over the years) will make me, well, dead, versus similar from an open source piece of software".

This is “Do I want a Trusted Root CA Certificate from anyone other than a Trusted Root CA”.

And the answer is clearly “No".

And ant-virus vendors should know better than to NOT give us the option of “No". 

https://www.securityweek.com/avast-antitrack-flaw-allows-mitm-attacks-https-traffic

https://www.pcworld.com/article/3154608/https-scanning-in-kaspersky-antivirus-exposed-users-to-mitm-attacks.html

.. and others.

  • 1 month later...
Posted

@libove Were you able to delete it completely? I’m also facing the same issue. I’ve tried disabling certificate purposes in properties but that is also automatically enabled after each restart.

Posted

@arb Welcome. As well as already suggested above by Harlan4096 , please contact K-Lab Tech Support.

Posted

I have a long-open, unresolved support case.

There is as yet no answer to this unacceptable situation.

 

  • 3 weeks later...
Posted

Great to know that it’s no longer disableable. That’s my good bye to kaspersky.

P.S. There’s a huge bug in the website allowing to bypass the login captcha and as a result bruteforce passwords. Won’t tell more about that as a it’s a plain stupid mistake on Kasperskys end and I won’t help a company MIM attacking my SSL traffic, modifying my certificates (I’m a server maintainer having to check server certificates from the browser!)  and bringing my login credentials at risk.

Posted

I have a long-open, unresolved support case.

Can you please provide your INC number.

 

  • 11 months later...
Posted

I realize this is an old thread, but I was able to resolve it by following your instructions below.  Perhaps KAV did make a change.

 

Try this, disabling:

  • Do not scan encrypted connections
  • Inject script into web traffic…
  • Delete Kaspersky Protection add-on in all browsers
  • Delete Kaspersky Root Certificate installed in Windows, to do this run certml.msc and:

In Action → Search Certificates → type kaspersky → click on button Search Now → once found → mouse right click → Remove / Delete

 

 

 

 

  • 1 year later...
Posted
On 4/7/2020 at 11:22 PM, harlan4096 said:

Try this, disabling:

  • Do not scan encrypted connections
  • Inject script into web traffic…
  • Delete Kaspersky Protection add-on in all browsers
  • Delete Kaspersky Root Certificate installed in Windows, to do this run certml.msc and:
498e62e7-a3b3-45b7-8a79-553ed05e8902.png

In Action → Search Certificates → type kaspersky → click on button Search Now → once found → mouse right click → Remove / Delete

 

 

 

 

On 6/4/2021 at 9:23 AM, chauzie said:

I realize this is an old thread, but I was able to resolve it by following your instructions below.  Perhaps KAV did make a change.

 

 

 

This does not work.  All steps followed and the certificate returns on reboot.  I agree with the OP, I want to be able to remove the Kaspersky certificate and keep it gone.  Any new ideas?

Please sign in to comment

You will be able to leave a comment after signing in



Sign In Now


×
×
  • Create New...