Cisco Crosswork Cloud Release Notes

Available Languages

Download Options

  • PDF
    (356.2 KB)
    View with Adobe Reader on a variety of devices
Updated:January 20, 2026

Bias-Free Language

The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.

Available Languages

Download Options

  • PDF
    (356.2 KB)
    View with Adobe Reader on a variety of devices
Updated:January 20, 2026
 

Cisco Crosswork Cloud. 3

New software features. 3

Compatibility. 6

Supported hardware. 7

Supported software packages. 7

Related resources. 9

Legal information. 10

 


 

Cisco Crosswork Cloud

This document outlines the new features and bug fixes for all Cisco Crosswork Cloud products.

To quickly set up and start using Crosswork Cloud, see the Cisco Crosswork Cloud Quick Start Guide.

See the Cisco Crosswork Cloud User Content to explore the Crosswork Cloud user journey, accessing tools and gathering insights for network routing, traffic optimization, and device integrity validation.

New software features

This section provides a description of the new software features and updates introduced in a release.

2026-01-26

Table 1.                 New features and fix released on 2026-01-26

Product

Product impact

Type

Unique identifier

Description

Crosswork Cloud Trust Insights

Crosswork Cloud Traffic Analysis

Software Reliability

Enhancement

CDG/Traffic/Trust-11050

The following security improvements have been made:

● SSH host key validation is now mandatory for both new and existing Trust Insights and Traffic Analysis devices, ensuring that credentials are only passed to verified devices. By requiring SSH host key validation for both Trust Insights and Traffic Analysis devices, device credentials are only accessible on verified SSH servers, significantly reducing the risk of credential compromise or interception of sensitive data.

● When you add a new device in Trust Insights or Traffic Analysis, enter the device’s SSH host key in the new SSH Host Key field before saving.

-In Trust Insights, navigate to Trust insights > Devices > Add Device.

-In Traffic Analysis, navigate to Traffic Analysis > Devices > Add Device.

After you provide the correct key, the system will validate it. This process may take up to twenty minutes. You will know it is successful when the status indicator changes from red to green.

● If your devices are already active and are not already alerting on host key mismatch, no action is needed for their host keys to load. This one-time, automatic action ensures your current devices continue to connect to Crosswork Cloud without interruption.

On March 2, 2026, the system will automatically accept host keys for all devices that were registered before this update. Moving forward, any newly added devices must have their host key specified during the onboarding process.

● To check the SSH host key status for previously added Trust Insights or Traffic Analysis devices, or if a device’s existing host key changed, go to the respective Devices table. For both Trust Insights and Traffic Analysis, select Configure > Devices from the UI and select the device. Review the newly added columns:

-Host Key: the name of the key

-Host Key Status:indicates whether the SSH host key is Accepted, Not Accepted, or Mismatched

Note: The Host Key and Host Key Status columns will be visible until the end of the migration period onMarch 2, 2026.

● When the correct host key is provided, SSH connections are made automatically. If the host key is incorrect, the UI will show the Host Key Status of Mismatched, and an SSH connection will not be established between the device and the cloud. User will be prompted to accept the correct key, while API users may update host keys using the HTTP PUT method.

The Not Accepted status is temporary and indicates one of two things: a device has been recently added, and its host key has yet to be validated, or the device’s host key is correct but has not been explicitly accepted by a user.

If a device with the host key status Not Accepted is using the correct host key, a connection will still be established. After March 2, 2026, host key statuses will no longer be shown. Instead, users will only be alerted in the case of host key mismatches and may remediate by accepting host keys in the UI, or by manually updating the host key for a device with an API call.

● If the Host Key Status for either Trust Insights or Traffic Analysis is Not Accepted or Mismatched, follow these steps to validate the host key:

1.     In the UI, go to Configure > Devices.

2.     Select the relevant device.

3.     At the top of the device table, click Accept Host Key to validate the device’s SSH host key.

● Devices that were registered before this update and were already showing a host key mismatch will continue to report a mismatch status after migration. The automatic host key acceptance process on March 2, 2026, will not resolve pre-existing mismatches.

To clear the mismatch and restore full device functionality (such as dossier collection), you must manually accept the correct host key for each affected device in the UI.

This behavior is identical to pre-update mismatch handling: the device remains connected to Crosswork Cloud, but certain actions are blocked until the host key is accepted.

● In addition, updated APIs now support host keys when adding, getting, and updating devices:

-POSTon api/v1/devices now requires the sshHostKey field to be provided within accessParams.

-GETon api/v1/devices now returns the sshHostKey within accessParams for the queried device.

-PUTon api/v1/devices/{deviceId} now requires the sshHostKey field to be provided within accessParams.

 

 

Compatibility

This Crosswork Cloud products are supported across multiple browsers.

Supported browsers

●     Google Chrome 70 or later

●     Mozilla Firefox 62 or later

●     Safari 18.3.1 or later

Supported hardware

Crosswork Cloud products are supported across various mobile devices.

Mobile devices

●     Phones

●     Tablets

●     Laptops

Supported software packages

Crosswork Cloud Trust Insights supports the following software:

●     Cisco Crosswork Data Gateway

●     Cisco 8000, Cisco NCS 5500, Cisco NCS 540, Cisco NCS 540 (LNT), and Cisco ASR 9000 series devices running Cisco IOS XR 7.3.1 or later.

Trust Insights supported devices

The following Cisco IOS XR versions are validated to work with Crosswork Cloud Trust Insights.

Table 2.                 Cisco IOS XR versions validated to work with Crosswork Cloud Trust Insights

Software package

Releases

Cisco IOS XR

7.3.1, 7.3.2, 7.3.3, 7.3.4

7.4.1, 7.4.2

7.5.1, 7.5.2, 7.5.4

7.6.1, 7.6.2

7.7.1, 7.7.2

7.8.1

7.9.1, 7.9.2

7.10.x

7.11.x

24.2.x (Starting in 2024, Cisco IOS XR changed the naming and release strategy. For more details, see here.)

24.3.x

Requirements to enable fingerprinting

Starting with Cisco IOS XR 24.2.x, fingerprinting has been disabled by default. You must enable fingerprinting.

For example:

ios(config)#install fingerprints frequency <num>

where <num> can be any value between 1-12 and indicates the frequency of fingerprint generation in hours.

Integration with Cisco IOS XR devices

For information on how to integrate Cisco IOS XR and Crosswork Cloud Trust Insights, refer to this table.

Table 3.                 Related Cisco IOS XR documentation platform

For more information on Cisco routers, see the following platform documentation:

●     Cisco 8000 Series Routers

●     Cisco NCS 5500 Series Routers

●     Cisco NCS 540 Series Routers

●     Cisco ASR 9000 Series Routers

Supported Crosswork Data Gateway version

You can download the supported Cisco Crosswork Data Gateway version for Crosswork Cloud products from the Cisco Software Download page. For more information, see the following:

●     Cisco Crosswork Data Gateway Release Notes

●     Cisco Crosswork Data Gateway Installation and Configuration Guide for Cloud Applications

Note:

    Cisco Crosswork Data Gateway 5.0 is not supported.

    Confirm that system requirements are met (see the Installation Requirements chapter in the Cisco Crosswork Data Gateway Installation and Configuration Guide for Cloud Deployment).

    For older versions, see Cisco Crosswork Data Gateway for Cloud Applications documents.

Related resources

See these links to view prior Crosswork Cloud Release Notes:

●     2025 Archived Crosswork Cloud Release Notes

●     2024 Archived Crosswork Cloud Release Notes

●     2023 Archived Crosswork Cloud Release Notes

●     2022 Archived Crosswork Cloud Release Notes

●     2021 Archived Crosswork Cloud Release Notes

Legal information

Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R)

Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional and coincidental.

© 2026 Cisco Systems, Inc. All rights reserved.

 

Learn more