Resolved issues
The following issues have been resolved in FortiAP version 6.4.8. For inquiries about a particular bug, visit the Fortinet Support website.
Bug ID |
Description |
---|---|
421233 |
FortiAP failed to disable wireless multimedia (WMM) settings in the QoS profile. |
606388 |
Sometimes, FortiGate would report SSID's from authorized FortiAP devices as "fake-ap-on-air". |
651452 |
The console port of FAP-231F, 234F and 23JF would occasionally lock-up. |
716641 |
On local-standalone SSID, RADIUS authentication requests were not sent to the secondary RADIUS server when the first one was unreachable. |
719386 |
Synchronize FortiPresence data reporting based on the system time of the WiFi Controller. |
724927 |
FortiAP would take a long time to connect back to the WiFi Controller after implementing reboot from FortiAP CLI. |
733260 |
Draeger Delta devices suffered from multicast packets loss for a long period of time. |
746769 |
Fixed
a Target Assert issue: |
754299 |
FortiAP devices previously connected to FortiLAN Cloud could not reconnect after some time. |
754327 |
Fixed a dynamic VLAN assignment issue when RADIUS-MAC authentication was delayed. |
754775 |
FortiAP might send corrupted IPv6 client information to FortiGate when reconnected. |
767608 |
802.11n and 802.11ac clients could not connect with local-standalone SSID. |
767941 |
802.11ax clients got low throughput when connected to an SSID with PMF set to optional. |
774055 |
Captive-portal SSID with VLAN ID could not work as the DNS IP was blocked. |
776707 |
Sometimes, FortiAP didn't report LLDP info to the WiFi Controller. |
779712 |
FortiAP would stop responding to SNMP queries sometimes. |
Common vulnerabilities and exposures
FortiAP 6.4.8 is no longer vulnerable to the following common vulnerabilities and exposures (CVE) references:
Bug ID |
Description |
---|---|
786638 |
CVE-2022-29058 (Command injection in CLI). |
Visit https://fortiguard.com for more information.