Thanks for your post mentioning that all newly created VMs have the KEK updated.
That led me to try setting the secure boot template (in Hyper-V manager, VM settings, Security) to "Microsoft UEFI Certificate Authority" and then booting. That failed to boot (appears to only trust 3rd-party images, e.g. Linux) but once I changed it back to "Microsoft Windows", Windows booted, and the KEK was updated. I then tried the same on a 2019 VM on a 2019 host - shut down VM, change template to "Microsoft UEFI Certificate Authority", click Apply, change template to "Microsoft Windows", click apply/OK, start the VM, and it appears to have worked.
This device has updated Secure Boot CA/keys. This device signature information is included here.
DeviceAttributes: FirmwareManufacturer:Microsoft Corporation;FirmwareVersion:Hyper-V UEFI Release v4.1;OEMModelNumber:Virtual Machine;OEMManufacturerName:Microsoft Corporation;OSArchitecture:amd64;
BucketId: [redacted]
BucketConfidenceLevel:
UpdateType: Windows UEFI CA 2023 (DB), Option ROM CA 2023 (DB), 3P UEFI CA 2023 (DB), KEK 2023, Boot Manager (2023)
For more information, please see https://go.microsoft.com/fwlink/?linkid=2301018.
It looks like this can also be done in PowerShell using https://learn.microsoft.com/en-us/powershell/module/hyper-v/set-vmfirmware?view=windowsserver2025-ps, e.g.
Get-VM -Name server22vm | Set-VMFirmware -SecureBootTemplate MicrosoftUEFICertificateAuthority
Get-VM -Name server22vm | Set-VMFirmware -SecureBootTemplate MicrosoftWindows