Resolved issues
The following issues have been resolved in FortiAP version 6.4.6. For inquiries about a particular bug, visit the Fortinet Support website.
Bug ID |
Description |
---|---|
638494 | 802.11ax FAP models cannot support rogue AP suppression. |
684825 | Unable to establish MESH between two FortiAP units when DHCP relay is used on FortiGate. |
694252 | Wi-Fi client connected to FAP-431F stops passing traffic intermittently. |
701896 | After long idle time, WiFi clients cannot reconnect to FortiAP Cloud SSID with PMF enabled. |
710922 | FortiAP units cannot stay on the channels assigned by FortiGate DARRP function. |
718756 | FAP-231F in a remote location is unable to come online on a FGT in a central location via MPLS/site-to-site VPN. |
719640 |
WiFi clients cannot connect bridge-mode SSID when NP7 FGT has capwap-offload enabled. |
Common vulnerabilities and exposures
FortiAP 6.4.6 is no longer vulnerable to the following common vulnerabilities and exposures (CVE) references:
Bug ID |
Description |
---|---|
681061 | CVE-2021-26106: FortiAP OS command injection through hidden kdbg CLI command. |
Visit https://fortiguard.com for more information.