Resolved issues
The following issues have been resolved in FortiAP-S and FortiAP-W2 version 6.4.8. For inquiries about a particular bug, visit the Fortinet Support website.
Bug ID |
Description |
---|---|
421233 |
FortiAP failed to disable wireless multimedia (WMM) settings in the QoS profile. |
606388 |
Sometimes, FortiGate would report SSIDs from authorized FortiAP devices as "fake-ap-on-air". |
716641 |
On a local-standalone SSID, the RADIUS authentication request was not sent to the secondary RADIUS server when the first one was unreachable. |
742221 |
Fix
a kernel crash in |
746769 |
Fixed
a Target Assert issue: |
750612 |
Fix
a kernel crash in |
754299 |
FortiAP devices previously connected to FortiLAN Cloud could not reconnect after some time. |
754327 |
Fixed a dynamic VLAN assignment issue when RADIUS-MAC authentication was delayed. |
754775 |
FortiAP might send corrupted IPv6 client information to FortiGate when reconnected. |
767608 |
802.11n and 802.11ac clients could not connect with local-standalone SSIDs. |
774055 |
Captive-portal SSIDs with VLAN ID could not work as the DNS IP was blocked. |
776707 |
Sometimes, FortiAP didn't report LLDP info to the WiFi Controller. |
779712 |
FortiAP would stop responding SNMP queries sometimes. |
Common vulnerabilities and exposures
FortiAP-S and FortiAP-W2 version 6.4.8 is no longer vulnerable to the following common vulnerabilities and exposures (CVE) references:
Bug ID |
Description |
---|---|
786638 |
CVE-2022-29058 (Command injection in CLI). |
Visit https://fortiguard.com for more information.