Cisco Bug: CSCur53172 - DOC: ACE30: SFTP transfer and strict host key checking
Nov 27, 2020
- Cisco Application and Content Networking System (ACNS) Software
Known Affected Releases
$$IGNORE-PSIRT CISCO HIGHLY CONFIDENTIAL - CONTROLLED ACCESS This issue is under review by the Cisco Product Security Incident Response team (PSIRT). The defect describes a product security vulnerability. Its contents must be protected from unauthorized disclosure, both internal and external to Cisco. Do not forward this information to mailing lists or newsgroups. Documentation writers: it is prohibited to publish this Release-note Enclosure (RNE) until the content has been approved by PSIRT. PSIRT may publish a Security Advisory regarding this defect, and the current text of this RNE will be replaced with appropriate information. In the event that a Security Advisory is not published, PSIRT will replace this text with an appropriate explanation. More information on PSIRT is available at <http//psirt.cisco.com/>. Cisco's public policy on security vulnerability handling can be reviewed at <http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html>. For further information, send a message to email@example.com. User: guest-Date:11-27-2020 Symptom: For SFTP transfers ACE does "Strict Host Key Checking". Conditions: Host key for SFTP server changes and no longer match the host key in "known_hosts" file on ACE.
Related Community Discussions
Bug details contain sensitive information and therefore require a Cisco.com account to be viewed.
Bug Details Include
- Full Description (including symptoms, conditions and workarounds)
- Known Fixed Releases
- Related Community Discussions
- Number of Related Support Cases