THIS FIELD NOTICE IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTY OF MERCHANTABILITY. YOUR USE OF THE INFORMATION ON THE FIELD NOTICE OR MATERIALS LINKED FROM THE FIELD NOTICE IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS FIELD NOTICE AT ANY TIME.
| Affected Software Product | Affected Release | Affected Release Number | Comments |
|---|---|---|---|
| Expressway Core and Edge | X14 | X14.0.0, X14.0.1, X14.0.10, X14.0.11, X14.0.2, X14.0.3, X14.0.4, X14.0.5, X14.0.6, X14.0.7, X14.0.8, X14.0.9, X14.2.0, X14.2.1, X14.2.2, X14.2.5, X14.2.6, X14.2.7, X14.3.0, X14.3.1, X14.3.2, X14.3.3, X14.3.4, X14.3.5, X14.3.6, X14.3.7 | All releases are affected. See the Workaround/Solution section for additional details. |
| Expressway Core and Edge | X15 | X15.0.0, X15.0.1, X15.0.2, X15.0.3, X15.2.0, X15.2.1, X15.2.2, X15.2.3, X15.2.4, X15.2.4., X15.3.0, X15.3.1, X15.3.2 | All releases are affected. See the Workaround/Solution section for additional details. |
| Defect ID | Headline |
| CSCwr73373 | Support for separate server and client Certificate for Expressway |
Effective June 2026, the Chrome Root Program Policy will restrict Root certificate authority (CA) certificates that are included in the Chrome Root Store, phasing out multi-purpose roots to align all public-key infrastructure (PKI) hierarchies to serve only TLS server authentication use cases.
This constraint includes Root CAs that only assert an Extended Key Usage (EKU) for Server Authentication (id-kp-serverAuth). As a result, certificates issued by Public Root CA with only Server Authentication EKU will not be valid for client authentication in mutual TLS (mTLS) setups.
To meet Chrome Root Program Policy requirements, effective June 2026, Public Root CAs that are part of the Google Chrome Root Store will be restricted to Server Authentication EKU only, sunsetting the Client Authentication EKU from it. As a response, public CA servers will stop issuing Server Authentication EKU certifications from May 2026.
Certificates must include ONLY Server Authentication EKU to maintain trust from the Google Chrome browser. Including the Client Authentication EKU in these certificates will be prohibited.
Although certain Public Root CAs continue to issue certificates containing the Client Authentication EKU, they will eventually be removed from the Chrome Root Store.
Certificates that are used for mTLS connections in Cisco Expressway are expected to include both Server and Client Authentication EKUs. Customers could choose to have these certificates from Public CA providers.
Server Authentication EKU-only certificates that are provided by Public Root CAs can "break" certificate validity, leading to potential authentication issues in Cisco Expressway and affecting proper functionality.
For more details, see Chrome Root Program Policy.
Cisco Expressway can be affected by potential authentication issues and impacted functionality due to broken certificate validity that is caused by using Server Authentication EKU-only certificates provided by Public Root CAs. The Public CA-signed certificate with Client Authentication EKU that is currently used for mTLS connections in Cisco Expressway is the Expressway Certificate.
This certificate is used for different mTLS connections, as shown in the following examples:
Before considering workaround and solution options, audit current certificates. Prepare an inventory of all public TLS certificates to identify which certificates contain the Client Authentication EKU. It is recommended that customers take a backup of their Cisco Expressway instance or manually copy the signed certificate and Private key.
Workaround
Administrators can choose from one of the following workaround options.
Option 1: Switch to Public Root CAs that provide combined EKU certificates
Some Public Root CAs, such as DigiCert and IdenTrust, issue certificates with combined EKU from an alternative root, which may not be included in the Chrome browser's trust store. Coordinate with your CA provider to check the availability of such certificates, and, before deploying them, ensure that both the server presenting the certificate and the clients consuming it trust the corresponding Root CA.
The following table shows examples of Public Root CAs and EKU types:
CA Vendor EKU Type Root CA Issuing/Sub CA IdenTrust clientAuth + serverAuth IdenTrust Public Sector Root CA 1 IdenTrust Public Sector Server CA 1 IdenTrust clientAuth IdenTrust Public Sector Root CA 1 TrustID RSA ClientAuth CA 2 IdenTrust serverAuth (browser trusted) IdenTrust Commercial Root CA 1 HydrantID Server CA O1 DigiCert clientAuth + serverAuth DigiCert Assured ID Root G2 DigiCert Assured ID CA G2 DigiCert clientAuth DigiCert Assured ID Root G2 DigiCert Assured ID Client CA G2 DigiCert serverAuth (browser trusted) DigiCert Global Root G2 DigiCert Global G2 TLS RSA SHA256 Option 2: Renew current certificates that are in use to extend their validity
- Certificates that were issued by Public Root CAs before May 2026 that have both Server and Client Authentication EKU will continue to be honored until their term expires. However, it is best to renew combined EKU certificates before policy sunsetting occurs.
- For maximum certificate validity, plan to renew certificates before March 15, 2026, after which Public CA-issued certificates will be valid only for 200 days. Cisco strongly recommends that you renew your certificates before this date if you wish to pursue this option.
- For customers using Let's Encrypt Certificates: Currently, Expressway uses a classic ACME profile and cannot be modified by users. This classic ACME profile is presently used for requesting certificates that include both Server and Client Authentication EKUs. Starting February 11, 2026, certificate requests using this profile will no longer include the Client Authentication EKU in certificates generated by Let's Encrypt.
- Note: Customers that are using Let's Encrypt certificates with the classic ACME profile should renew before February 11, 2026, ideally as close to that date as possible to maximize validity. For more information, see Ending TLS Client Authentication Certificate Support in 2026 - Let's Encrypt.
- Customers should also disable the ACME automated scheduler to prevent certificates from being automatically renewed after February 11, 2026. This action will help avoid certificates being inadvertently overwritten with versions that contain only the Server Authentication EKU.
- Public CA policy and implementation dates may vary. Some Public CAs have stopped issuing combined EKU certificates and may not provide one by default. To generate a certificate with a combined EKU, work with your CA authority and use a special profile provided by Public CAs.
The following image shows the Client Authentication EKU depreciation timeline (subject to change):
- After the solution becomes available, upgrade your servers. For more information, see the Solution section of this Field Notice. Follow the steps in the relevant Cisco Expressway Admin Guide to manage Expressway certificates:
Option 3: Evaluate and Migrate to Alternatives (for Expressway C only; not applicable to Expressway E)
- Evaluate the feasibility of transition to private PKI, and then set up a private CA to issue single certificates with combined EKU (server and client certificates with the required EKUs).
- When issuing a private CA-signed certificate, you will need to share root certificate information with the peer.
- Before issuing or deploying a certificate, ensure that both the server presenting the certificate and all clients consuming it trust the corresponding Root CA.
The following product enhancements will be implemented in the fixed release that is described in the table in this section:
Customers should plan to upgrade to fixed releases of Cisco software as shown in the following table:
| Product | Affected Release | Fixed Release | Purpose of Fix |
|---|---|---|---|
| Cisco Expressway |
X14.x Release Train: All releases X15.x Release Train: Earlier than X15.4 |
X15.4 (future release) This release allows additional upload of ServerAuth EKU-only signed certificate on Expressway E and certificate verification adjustment for MRA SIP signal between Expressway E and Expressway C. |
To accommodate certificates with ServerAuth EKU only and to enable MRA registrations. |
| Cisco Expressway |
X14.x Release Train: All releases X15.x Release Train: Earlier than X15.5 |
X15.5 (future release) This release provides UI enhancement for segregating client and server certificates and provides options to administrators to disable EKU checking. |
To meet global Google Chrome Root Program requirements. |
Note: Both Cisco Expressway E and Expressway C must be upgraded to the same version.
This issue also affects Cisco Calling On-Premises products and Cisco Unified Border Element. For information, see the following field notices:
| Version | Description | Section | Date |
| 1.0 | Initial Release | — | 2026-JAN-30 |
For further assistance or for more information about this field notice, contact the Cisco Technical Assistance Center (TAC) using one of the following methods:
To receive email updates about Field Notices (reliability and safety issues), Security Advisories (network security issues), and end-of-life announcements for specific Cisco products, set up a profile in My Notifications.
Unleash the Power of TAC's Virtual Assistance