Fortinet black logo

Resolved issues

Resolved issues

The following issues have been resolved in FortiAP-S and FortiAP-W2 version 6.4.8. For inquiries about a particular bug, visit the Fortinet Support website.

Bug ID

Description

421233

FortiAP failed to disable wireless multimedia (WMM) settings in the QoS profile.

606388

Sometimes, FortiGate would report SSIDs from authorized FortiAP devices as "fake-ap-on-air".

716641

On a local-standalone SSID, the RADIUS authentication request was not sent to the secondary RADIUS server when the first one was unreachable.

742221

Fix a kernel crash in ftnt_m2u_convert() and ol_ath_tx_mgmt_wmi_send().

746769

Fixed a Target Assert issue: ar_wal_peer.c:4578 Assertion 0 failedparam0 :zero, param1 :zero, param2 :zero.

750612

Fix a kernel crash in ieee80211_deliver_data().

754299

FortiAP devices previously connected to FortiLAN Cloud could not reconnect after some time.

754327

Fixed a dynamic VLAN assignment issue when RADIUS-MAC authentication was delayed.

754775

FortiAP might send corrupted IPv6 client information to FortiGate when reconnected.

767608

802.11n and 802.11ac clients could not connect with local-standalone SSIDs.

774055

Captive-portal SSIDs with VLAN ID could not work as the DNS IP was blocked.

776707

Sometimes, FortiAP didn't report LLDP info to the WiFi Controller.

779712

FortiAP would stop responding SNMP queries sometimes.

Common vulnerabilities and exposures

FortiAP-S and FortiAP-W2 version 6.4.8 is no longer vulnerable to the following common vulnerabilities and exposures (CVE) references:

Bug ID

Description

786638

CVE-2022-29058 (Command injection in CLI).

Visit https://fortiguard.com for more information.

Resolved issues

The following issues have been resolved in FortiAP-S and FortiAP-W2 version 6.4.8. For inquiries about a particular bug, visit the Fortinet Support website.

Bug ID

Description

421233

FortiAP failed to disable wireless multimedia (WMM) settings in the QoS profile.

606388

Sometimes, FortiGate would report SSIDs from authorized FortiAP devices as "fake-ap-on-air".

716641

On a local-standalone SSID, the RADIUS authentication request was not sent to the secondary RADIUS server when the first one was unreachable.

742221

Fix a kernel crash in ftnt_m2u_convert() and ol_ath_tx_mgmt_wmi_send().

746769

Fixed a Target Assert issue: ar_wal_peer.c:4578 Assertion 0 failedparam0 :zero, param1 :zero, param2 :zero.

750612

Fix a kernel crash in ieee80211_deliver_data().

754299

FortiAP devices previously connected to FortiLAN Cloud could not reconnect after some time.

754327

Fixed a dynamic VLAN assignment issue when RADIUS-MAC authentication was delayed.

754775

FortiAP might send corrupted IPv6 client information to FortiGate when reconnected.

767608

802.11n and 802.11ac clients could not connect with local-standalone SSIDs.

774055

Captive-portal SSIDs with VLAN ID could not work as the DNS IP was blocked.

776707

Sometimes, FortiAP didn't report LLDP info to the WiFi Controller.

779712

FortiAP would stop responding SNMP queries sometimes.

Common vulnerabilities and exposures

FortiAP-S and FortiAP-W2 version 6.4.8 is no longer vulnerable to the following common vulnerabilities and exposures (CVE) references:

Bug ID

Description

786638

CVE-2022-29058 (Command injection in CLI).

Visit https://fortiguard.com for more information.