Resolved issues
The following issues have been resolved in FortiAP-S and FortiAP-W2 version 6.4.0. For inquiries about a particular bug, visit the Fortinet Support website.
Bug ID |
Description |
---|---|
374645 | FortiAP-S and FortiAP-W2 models did not support the spectrum-analysis feature. |
551434 | Fixed FAP-221E kernel crash: PC is at _raw_write_lock+
|
573364 | FAP-231E did not support the Bluetooth low energy (BLE) function. |
600485 | External-authentication captive-portal SSID in local-bridging mode should support RADIUS CoA. |
606750 | FAP with region code W should support 2.4GHz channels. |
608111 | FAP with region code N should support channels 120, 124 and 128 when the country is set to New Zealand. |
608949 |
FAP should correctly set NAS-IP-Address as specified in RADIUS configuration. |
612550 |
FAP should support the Transmit Power Control (TPC) element (802.11h) in Beacon frames. |
612795 |
Ekahau tag detection did not work on 2.4GHz radio. |
618624 |
Fixed FAP-321E kernel crash at |
623297 |
External captive portal client may fail authentication after entering credential when secure HTTP is enabled. |
Common vulnerabilities and exposures
FortiAP-S and FortiAP-W2 version 6.4.0 are no longer vulnerable to the following common vulnerabilities and exposures (CVE) references:
Bug ID |
Description |
---|---|
602290 | CVE-2004-1653: SSH port forwarding exposes unprotected localhost/internal services. |
For details, visit the FortiGuard Labs website.