Fortinet black logo

Resolved issues

Resolved issues

The following issues have been resolved in FortiAP version 6.4.8. For inquiries about a particular bug, visit the Fortinet Support website.

Bug ID

Description

421233

FortiAP failed to disable wireless multimedia (WMM) settings in the QoS profile.

606388

Sometimes, FortiGate would report SSID's from authorized FortiAP devices as "fake-ap-on-air".

651452

The console port of FAP-231F, 234F and 23JF would occasionally lock-up.

716641

On local-standalone SSID, RADIUS authentication requests were not sent to the secondary RADIUS server when the first one was unreachable.

719386

Synchronize FortiPresence data reporting based on the system time of the WiFi Controller.

724927

FortiAP would take a long time to connect back to the WiFi Controller after implementing reboot from FortiAP CLI.

733260

Draeger Delta devices suffered from multicast packets loss for a long period of time.

746769

Fixed a Target Assert issue: ar_wal_peer.c:4578 Assertion 0 failedparam0 :zero, param1 :zero, param2 :zero.

754299

FortiAP devices previously connected to FortiLAN Cloud could not reconnect after some time.

754327

Fixed a dynamic VLAN assignment issue when RADIUS-MAC authentication was delayed.

754775

FortiAP might send corrupted IPv6 client information to FortiGate when reconnected.

767608

802.11n and 802.11ac clients could not connect with local-standalone SSID.

767941

802.11ax clients got low throughput when connected to an SSID with PMF set to optional.

774055

Captive-portal SSID with VLAN ID could not work as the DNS IP was blocked.

776707

Sometimes, FortiAP didn't report LLDP info to the WiFi Controller.

779712

FortiAP would stop responding to SNMP queries sometimes.

Common vulnerabilities and exposures

FortiAP 6.4.8 is no longer vulnerable to the following common vulnerabilities and exposures (CVE) references:

Bug ID

Description

786638

CVE-2022-29058 (Command injection in CLI).

Visit https://fortiguard.com for more information.

Resolved issues

The following issues have been resolved in FortiAP version 6.4.8. For inquiries about a particular bug, visit the Fortinet Support website.

Bug ID

Description

421233

FortiAP failed to disable wireless multimedia (WMM) settings in the QoS profile.

606388

Sometimes, FortiGate would report SSID's from authorized FortiAP devices as "fake-ap-on-air".

651452

The console port of FAP-231F, 234F and 23JF would occasionally lock-up.

716641

On local-standalone SSID, RADIUS authentication requests were not sent to the secondary RADIUS server when the first one was unreachable.

719386

Synchronize FortiPresence data reporting based on the system time of the WiFi Controller.

724927

FortiAP would take a long time to connect back to the WiFi Controller after implementing reboot from FortiAP CLI.

733260

Draeger Delta devices suffered from multicast packets loss for a long period of time.

746769

Fixed a Target Assert issue: ar_wal_peer.c:4578 Assertion 0 failedparam0 :zero, param1 :zero, param2 :zero.

754299

FortiAP devices previously connected to FortiLAN Cloud could not reconnect after some time.

754327

Fixed a dynamic VLAN assignment issue when RADIUS-MAC authentication was delayed.

754775

FortiAP might send corrupted IPv6 client information to FortiGate when reconnected.

767608

802.11n and 802.11ac clients could not connect with local-standalone SSID.

767941

802.11ax clients got low throughput when connected to an SSID with PMF set to optional.

774055

Captive-portal SSID with VLAN ID could not work as the DNS IP was blocked.

776707

Sometimes, FortiAP didn't report LLDP info to the WiFi Controller.

779712

FortiAP would stop responding to SNMP queries sometimes.

Common vulnerabilities and exposures

FortiAP 6.4.8 is no longer vulnerable to the following common vulnerabilities and exposures (CVE) references:

Bug ID

Description

786638

CVE-2022-29058 (Command injection in CLI).

Visit https://fortiguard.com for more information.