Fortinet black logo

Resolved issues

Resolved issues

The following issues have been resolved in FortiAP version 7.0.2. For inquiries about a particular bug, visit the Fortinet Support website.

Bug ID

Description

421233 FortiAP failed to disable wireless multimedia (WMM) setting in QoS profile.
716641 On local-standalone SSID, RADIUS authentication request was not sent to secondary RADIUS server when first one was unreachable.

731369

Draeger M300 devices in Power Save mode would disconnect from FortiAP after a few hours.

733260

Draeger Delta devices suffered from multicast packets loss for a long period of time.

737343

FortiAP with location-based service enabled was reporting a specific client as both station and rogue AP.

738596

FortiAP SSH server limited the credentialed scan performed with Nessus Scanner.

743241

FortiAP mesh link dropped while using Cisco Webex/Telepresence devices.

746769

Fixed a Target Assert issue: ar_wal_peer.c:4578 Assertion 0 failedparam0 :zero, param1 :zero, param2 :zero.

754775

FortiAP might send corrupted IPv6 client information to FortiGate when reconnected.

Common vulnerabilities and exposures

FortiAP 7.0.2 is no longer vulnerable to the following common vulnerabilities and exposures (CVE) references:

Bug ID

Description

719016

FRAG attack:

  • CVE-2020-24586
  • CVE-2020-24587
  • CVE-2020-24588

Visit https://fortiguard.com for more information.

Resolved issues

The following issues have been resolved in FortiAP version 7.0.2. For inquiries about a particular bug, visit the Fortinet Support website.

Bug ID

Description

421233 FortiAP failed to disable wireless multimedia (WMM) setting in QoS profile.
716641 On local-standalone SSID, RADIUS authentication request was not sent to secondary RADIUS server when first one was unreachable.

731369

Draeger M300 devices in Power Save mode would disconnect from FortiAP after a few hours.

733260

Draeger Delta devices suffered from multicast packets loss for a long period of time.

737343

FortiAP with location-based service enabled was reporting a specific client as both station and rogue AP.

738596

FortiAP SSH server limited the credentialed scan performed with Nessus Scanner.

743241

FortiAP mesh link dropped while using Cisco Webex/Telepresence devices.

746769

Fixed a Target Assert issue: ar_wal_peer.c:4578 Assertion 0 failedparam0 :zero, param1 :zero, param2 :zero.

754775

FortiAP might send corrupted IPv6 client information to FortiGate when reconnected.

Common vulnerabilities and exposures

FortiAP 7.0.2 is no longer vulnerable to the following common vulnerabilities and exposures (CVE) references:

Bug ID

Description

719016

FRAG attack:

  • CVE-2020-24586
  • CVE-2020-24587
  • CVE-2020-24588

Visit https://fortiguard.com for more information.