02-11-2025 06:43 PM
Baltimore CyberTrust Root is expired.
As we found it on Trusted Certificates on ISE.
This certificate will expire soon. When it expires, ISE may fail when attempting to establish secure communications with clients. Inter-node communication may also be affected.
Description: Auto imported for secure connection to cisco.com/perfigo.com
Usage: Trust for authentication of cisco services
Valid From Sat, 13 May 2000 01:46:00 ICT
Valid To (Expiration) Tue, 13 May 2025 06:59:00 ICT
Suggested Actions Replace the certificate. For a trust certificate, contact the issuing Certificate Authority (CA). For a CA-signed local certificate, generate a CSR and have the CA create a new certificate. For a self-signed local certificate, use ISE to extend the expiration date. You can just delete the certificate if it is no longer used.
How to resolve this issue?
Thank you,
Solved! Go to Solution.
02-12-2025 12:56 AM
Look at the details found in CSCwo05386.
1. The Bug ID was created today, 12 February 2025.
2. Yet, there are already >31 TAC Cases.
That is 31 TAC cases in less than 24 hours. This means ISE TAC is currently getting swamped and have no time to update the Bug IDs.
Options are:
1. Raise a TAC Case and get "associated" to this Bug ID
2. Contact/Escalate your Cisco Account Manager/SE
3. Wait for TAC to provide further information.
02-12-2025 01:37 AM
02-16-2025 07:12 PM
This Trusted Certificate is tagged for "Cisco Services" only. This means, it is not used for your ISE EAP 802.1X at all. Cisco Services means that ISE will check the remote server it's connecting to for the services I mentioned previously, to see if ISE trusts those remote systems. I showed that these services do not use this CA chain at all. Cisco just forgot to remove this orphaned Trusted cert - and they should include this deletion in the next patch updates.
03-19-2025 02:56 PM
02-11-2025 06:49 PM - edited 02-11-2025 06:50 PM
Raise a TAC case.
If this is correct (and widespread) TAC will need to release a patch soon-ish and a Field Notice will need to be fast-tracked.
02-11-2025 08:48 PM
As your experience, this is the new issue ? @Leo Laohoo
02-11-2025 09:21 PM
For everyone's sake, pray that I am wrong.
02-11-2025 09:06 PM
The expired Baltimore CyberTrust Root is causing authentication problems—hoping Cisco provides a smooth fix or workaround soon!
02-11-2025 10:14 PM
Would you have an idea what "Baltimore CyberTrust Root" cert does and what happens (i. e. what "breaks") when this specific cert expires?
02-11-2025 10:55 PM
A reply from Cisco would sure be helpful and informative so not everyone have to make a TAC case, but by the description it seems this is only used to trust access to "cisco.com/perfigo.com"
When I look at that domain now the cert is issued by IdenTrust Commercial Root CA 1 and this is also present in the ISE trust store.
02-11-2025 11:35 PM
@Arne Bier has shared CSCwo05386.
02-12-2025 12:43 AM
So we is next besides from contacting to TAC? @Leo Laohoo @Arne Bier
02-12-2025 12:56 AM
Look at the details found in CSCwo05386.
1. The Bug ID was created today, 12 February 2025.
2. Yet, there are already >31 TAC Cases.
That is 31 TAC cases in less than 24 hours. This means ISE TAC is currently getting swamped and have no time to update the Bug IDs.
Options are:
1. Raise a TAC Case and get "associated" to this Bug ID
2. Contact/Escalate your Cisco Account Manager/SE
3. Wait for TAC to provide further information.
02-12-2025 01:13 AM
3. Wait for TAC to provide further information.
I am looking forward to getting response from Cisco.
02-12-2025 01:37 AM
02-12-2025 02:39 AM
Thanks for sharing the Bug ID, @Arne Bier.
02-12-2025 09:47 AM
This certificate is for the air-gapped devices as well? I mean no internet connection ISE?
02-12-2025 08:16 PM
Alarm Name :
Certificate Expiration
Details :
Trust certificate 'Baltimore CyberTrust Root' will expire in 90 days : Server=XXXXX
Description :
This certificate will expire soon. When it expires, ISE may fail when attempting to establish secure communications with clients. Inter-node communication may also be affected
Severity :
Warning
Suggested Actions :
Replace the certificate. For a trust certificate, contact the issuing Certificate Authority (CA). For a CA-signed local certificate, generate a CSR and have the CA create a new certificate. For a self-signed local certificate, use ISE to extend the expiration date. You can just delete the certificate if it is no longer used
*** This message is generated by Cisco Identity Services Engine (ISE) ***
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide