Fortinet black logo

Resolved Issues

Resolved Issues

The following issues have been fixed in FortiAnalyzer version 7.4.1. To inquire about a particular bug, please contact Customer Service & Support.

Device Manager

Bug ID Description
882093 Unexpected FortiNAC ADOM is added to FortiAnalyzer after the upgrade.

937850

Device Connectivity status is displayed as "Unknown" under the Device Manager.

FortiSOC

Bug ID Description
860245 FortiAnalyzer is unable to delete all of the FortiSOC Incidents entries at once from the GUI.

FortiView

Bug ID Description

783408

When selecting 'IPSec VPN' login type under the Top Failed Authentication tab, it displays No Results.

903322

Top Website Domains, Top Website Categories, and Top Browsing Users under the FortiView may not display logs properly if the logflag fields are not correct.

918623 Visiting the Secure SD-WAN Monitor section makes the page unresponsive and does not load.

Log View

Bug ID Description
898489 The logs from FortiGate devices are not visible in FortiAnalyzer when selecting a 1-hour time range.
904135 Time Stamp column under Log View is blank.
913740 For the DLP under the Log View, the Subject column of SMTP log is blank in formatted mode.
924701 The action columns on the traffic log are no longer displayed in color.

925905

Tabs under the Log View > FortiWeb displays a blank page.

937729

LogView > Fabric filter does not work with classless subnets.

943107

FortiAnalyzer does not allow downloading the DLP Archive file from Log View GUI.

Others

Bug ID Description
883297 If FortiAnalyzer is receiving FortiClient logs, the 'oftpd' process consumes excessive system resources, which might impair the proper functioning of FortiAnalyzer.

889917

During the upgrade process, a non-critical error message "Duplicate root nodes found in ADOM." has been observed. This error is harmless and does not impact the functionality of the FortiManager/FortiAnalyzer.

897763

922549

The FortiAnalyzer HA cluster synchronization is stuck at the "HA_SYNC_STATE_SENDING_METADATA" status.
912636 log-integrity checking with md5 enabled fails.
915301 FortiView widgets on FortiProxy shows "Failed to Retrieve Fortiview Data".
919088 GUI may not work properly in Google Chrome and Microsoft Edge version 114.

920280

Syslog encrypted log foward sends an incorrect SNI in the client hello message.

927381 High, constant I/O usage on the FortiAnalyzer may adversely affect the proper functioning of the "oftpd process".
927670 Secondary FortiAnalyzer is generating false alerts with the following error message: "Did not receive any log from device."

Reports

Bug ID Description
878067 Legend field on table chart cannot be edited/saved.
896843 The "fgt-intf-stats-summary-rcvd/sent-bps" report does not include the interface from non-mgmt vdoms.
932310 Unable to import report to FortiAnalyzer.

System Settings

Bug ID Description
832265 Enabling exclusions for log forwarding results in empty fields in the Exclusion List.
898441 Unable to set Match Criteria to "Not equal to/Not Contain" via GUI under the Log Forwarding setting.
899443 No Data In PCAP File Produced in GUI Packet Capture.
907678 Configured role loges are not automatically deleted after being sent to the file server.

Common Vulnerabilities and Exposures

Visit https://fortiguard.com/psirt for more information.

Bug ID CVE references

539972

FortiAnalyzer 7.4.1 is no longer vulnerable to the following CVE Reference:

  • CVE-2023-44256

904375

FortiAnalyzer 7.4.1 is no longer vulnerable to the following CVE Reference:

  • CVE-2023-42782

921579

FortiAnalyzer 7.4.1 is no longer vulnerable to the following CVE Reference:

  • CVE-2023-42788

922503

FortiAnalyzer 7.4.1 is no longer vulnerable to the following CVE Reference:

  • CVE-2023-41838

928114

FortiAnalyzer 7.4.1 is no longer vulnerable to the following CVE Reference:

  • CVE-2023-42787

934151

FortiAnalyzer 7.4.1 is no longer vulnerable to the following CVE Reference:

  • CVE-2023-42791

941847

FortiAnalyzer 7.4.1 is no longer vulnerable to the following CVE Reference:

  • CVE-2023-44249

Resolved Issues

The following issues have been fixed in FortiAnalyzer version 7.4.1. To inquire about a particular bug, please contact Customer Service & Support.

Device Manager

Bug ID Description
882093 Unexpected FortiNAC ADOM is added to FortiAnalyzer after the upgrade.

937850

Device Connectivity status is displayed as "Unknown" under the Device Manager.

FortiSOC

Bug ID Description
860245 FortiAnalyzer is unable to delete all of the FortiSOC Incidents entries at once from the GUI.

FortiView

Bug ID Description

783408

When selecting 'IPSec VPN' login type under the Top Failed Authentication tab, it displays No Results.

903322

Top Website Domains, Top Website Categories, and Top Browsing Users under the FortiView may not display logs properly if the logflag fields are not correct.

918623 Visiting the Secure SD-WAN Monitor section makes the page unresponsive and does not load.

Log View

Bug ID Description
898489 The logs from FortiGate devices are not visible in FortiAnalyzer when selecting a 1-hour time range.
904135 Time Stamp column under Log View is blank.
913740 For the DLP under the Log View, the Subject column of SMTP log is blank in formatted mode.
924701 The action columns on the traffic log are no longer displayed in color.

925905

Tabs under the Log View > FortiWeb displays a blank page.

937729

LogView > Fabric filter does not work with classless subnets.

943107

FortiAnalyzer does not allow downloading the DLP Archive file from Log View GUI.

Others

Bug ID Description
883297 If FortiAnalyzer is receiving FortiClient logs, the 'oftpd' process consumes excessive system resources, which might impair the proper functioning of FortiAnalyzer.

889917

During the upgrade process, a non-critical error message "Duplicate root nodes found in ADOM." has been observed. This error is harmless and does not impact the functionality of the FortiManager/FortiAnalyzer.

897763

922549

The FortiAnalyzer HA cluster synchronization is stuck at the "HA_SYNC_STATE_SENDING_METADATA" status.
912636 log-integrity checking with md5 enabled fails.
915301 FortiView widgets on FortiProxy shows "Failed to Retrieve Fortiview Data".
919088 GUI may not work properly in Google Chrome and Microsoft Edge version 114.

920280

Syslog encrypted log foward sends an incorrect SNI in the client hello message.

927381 High, constant I/O usage on the FortiAnalyzer may adversely affect the proper functioning of the "oftpd process".
927670 Secondary FortiAnalyzer is generating false alerts with the following error message: "Did not receive any log from device."

Reports

Bug ID Description
878067 Legend field on table chart cannot be edited/saved.
896843 The "fgt-intf-stats-summary-rcvd/sent-bps" report does not include the interface from non-mgmt vdoms.
932310 Unable to import report to FortiAnalyzer.

System Settings

Bug ID Description
832265 Enabling exclusions for log forwarding results in empty fields in the Exclusion List.
898441 Unable to set Match Criteria to "Not equal to/Not Contain" via GUI under the Log Forwarding setting.
899443 No Data In PCAP File Produced in GUI Packet Capture.
907678 Configured role loges are not automatically deleted after being sent to the file server.

Common Vulnerabilities and Exposures

Visit https://fortiguard.com/psirt for more information.

Bug ID CVE references

539972

FortiAnalyzer 7.4.1 is no longer vulnerable to the following CVE Reference:

  • CVE-2023-44256

904375

FortiAnalyzer 7.4.1 is no longer vulnerable to the following CVE Reference:

  • CVE-2023-42782

921579

FortiAnalyzer 7.4.1 is no longer vulnerable to the following CVE Reference:

  • CVE-2023-42788

922503

FortiAnalyzer 7.4.1 is no longer vulnerable to the following CVE Reference:

  • CVE-2023-41838

928114

FortiAnalyzer 7.4.1 is no longer vulnerable to the following CVE Reference:

  • CVE-2023-42787

934151

FortiAnalyzer 7.4.1 is no longer vulnerable to the following CVE Reference:

  • CVE-2023-42791

941847

FortiAnalyzer 7.4.1 is no longer vulnerable to the following CVE Reference:

  • CVE-2023-44249