Fortinet black logo

Resolved issues

Resolved issues

The following issues have been resolved in FortiAP-U version 6.2.4. For more details about a particular bug, visit the Fortinet Customer Service & Support website.

Bug ID

Description

680851, 721678, 721679

FAP-U231F, U234F and U432F cannot report Spectrum Analysis results to FortiGate.

701925, 776980

Fixed false radar detection issues when using DFS channels.

721629

FAP-U431F with dtls-policy=ipsec-vpn cannot connect to FortiGate if it is behind another firewall or NAT device.

727279

FAP-U gets disconnected from FortiLAN Cloud with the reason "received unexpected discovery".

743464

When managed by a FortiGate, the max transmit power of FAP-U323EV was lower than expected.

Note: The previous fix in FAP-U 6.2.3 release has been reverted.

747843

FAP-U radio transmission would freeze when kept busy.

751919

FAP-U431F encountered a kernel panic issue when client load was high.

758723

FAP-U failed to apply the new AC IP address obtained from DHCP option code 138.

758736

FAP-U UTM module should print IPS event logs when IPS action is set to Monitor.

762095

Synchronize FortiPresence data reporting based on the system time of WiFi controller.

765491

Post upgrade forces user to change their password even if a valid and complex password has been set already; then the FAP-U device reboots automatically.

771407

FAP-U did not fill "System Description" properly in the LLDP report to the peer node and the controller.

771887

Captive-portal exempted users are not able to ping each other or other clients on same SSID.

778008

FAP-U431F encountered kernel panic PC is at wlc_ampdu_resp_timeout+0xd4/0x258 [wl].

782825

WiFi clients cannot complete authentication on WPA2-Enterprise SSID in time after manually inputting their username and password.

786149

FAP-U431F experienced memory leak when managed by FortiLAN Cloud

Common vulnerabilities and exposures

FortiAP-U 6.2.4 is no longer vulnerable to the following CVE-Reference:

Bug ID

CVE References

802453

CVE-2022-30301: Relative path traversal vulnerability in CLI.

786641

CVE-2022-29058: Command injection in CLI.

Visit https://fortiguard.com for more information.

Resolved issues

The following issues have been resolved in FortiAP-U version 6.2.4. For more details about a particular bug, visit the Fortinet Customer Service & Support website.

Bug ID

Description

680851, 721678, 721679

FAP-U231F, U234F and U432F cannot report Spectrum Analysis results to FortiGate.

701925, 776980

Fixed false radar detection issues when using DFS channels.

721629

FAP-U431F with dtls-policy=ipsec-vpn cannot connect to FortiGate if it is behind another firewall or NAT device.

727279

FAP-U gets disconnected from FortiLAN Cloud with the reason "received unexpected discovery".

743464

When managed by a FortiGate, the max transmit power of FAP-U323EV was lower than expected.

Note: The previous fix in FAP-U 6.2.3 release has been reverted.

747843

FAP-U radio transmission would freeze when kept busy.

751919

FAP-U431F encountered a kernel panic issue when client load was high.

758723

FAP-U failed to apply the new AC IP address obtained from DHCP option code 138.

758736

FAP-U UTM module should print IPS event logs when IPS action is set to Monitor.

762095

Synchronize FortiPresence data reporting based on the system time of WiFi controller.

765491

Post upgrade forces user to change their password even if a valid and complex password has been set already; then the FAP-U device reboots automatically.

771407

FAP-U did not fill "System Description" properly in the LLDP report to the peer node and the controller.

771887

Captive-portal exempted users are not able to ping each other or other clients on same SSID.

778008

FAP-U431F encountered kernel panic PC is at wlc_ampdu_resp_timeout+0xd4/0x258 [wl].

782825

WiFi clients cannot complete authentication on WPA2-Enterprise SSID in time after manually inputting their username and password.

786149

FAP-U431F experienced memory leak when managed by FortiLAN Cloud

Common vulnerabilities and exposures

FortiAP-U 6.2.4 is no longer vulnerable to the following CVE-Reference:

Bug ID

CVE References

802453

CVE-2022-30301: Relative path traversal vulnerability in CLI.

786641

CVE-2022-29058: Command injection in CLI.

Visit https://fortiguard.com for more information.