The digital Certificate certifies the ownership of a Public Key by the named Certificate Subject of the Certificate.
The Registration Authority which is often the same as the Certificate Authority performs this by Identity Proofing during the Certificate Request Process.
This Certificate Request Process is designed to allow the Relying Party to Trust upon Digital Signatures or assertions made by the Private Key that corresponds to the Public Key is Authentic.
Certificate Authoritys are characteristic of many Public Key Infrastructure (PKI) schemes.[1]
The user is responsible for going through the step of Certificate Validation for a certificate with a Certificate Authority to figure out if the certificate presented is valid.
Each Certificate Authority must have a CAPK and available to the user or device to perform the Certificate Validation of any Certificates.
The Threat of certificates were issued that could or did lead to weaknesses has happened multiple times in the last decade. Perhaps the most well-known of these is DigiNotar, a Dutch CA that was compromised in 2011. One of the certificates was allegedly used by the government of Iran to intercept sessions of its citizens. This is one of the Public Key Infrastructure Weaknesses.