Resolved issues
The following issues have been resolved in FortiAP version 7.0.4. For inquiries about a particular bug, visit the Fortinet Support website.
Bug ID |
Description |
---|---|
606388 |
Sometimes,
FortiGate would report SSIDs from authorized FortiAP devices as " |
651452 |
The console port of FAP-231F, 234F and 23JF would occasionally lock-up. |
711919 |
Probe requests and responses were not logged by 802.11ax-capable FortiAP models. |
724927 |
FortiAP
would take a long time to connect back to the WiFi Controller after implementing |
767941 |
802.11ax clients got low throughput when connected to an SSID with PMF set to optional. |
778554 |
REST-API support: Expose max interface speed of all Ethernet ports on FortiAP. |
779712 |
FortiAP would stop responding SNMP queries sometimes. |
786273 |
Add Station RSSI and SNR inside Probe logs. Note: FortiGate needs to run FOS 7.2.0 or later. |
787499 |
Wireless clients were unable to complete authentication on the captive portal page. |
790245 |
Sometimes,
FortiAP could not reconnect to FortiLAN Cloud and received error message: " |
790913 |
Add server IP/Name information to RADIUS, DNS and DHCP wireless event logs. Note: FortiGate needs to run FOS 7.2.0 or later. |
791692 |
When FAP-23JF is managed by FortiLAN Cloud, the LAN ports aren't actually down after configured to be offline. |
Common vulnerabilities and exposures
FortiAP 7.0.4 is no longer vulnerable to the following common vulnerabilities and exposures (CVE) references:
Bug ID |
Description |
---|---|
786638 |
CVE-2022-29058 (Command injection in CLI). |
Visit https://fortiguard.com for more information.