Fortinet black logo

Resolved issues

Resolved issues

The following issues have been resolved in FortiAP version 7.0.4. For inquiries about a particular bug, visit the Fortinet Support website.

Bug ID

Description

606388

Sometimes, FortiGate would report SSIDs from authorized FortiAP devices as "fake-ap-on-air".

651452

The console port of FAP-231F, 234F and 23JF would occasionally lock-up.

711919

Probe requests and responses were not logged by 802.11ax-capable FortiAP models.

724927

FortiAP would take a long time to connect back to the WiFi Controller after implementing reboot from the FortiAP CLI.

767941

802.11ax clients got low throughput when connected to an SSID with PMF set to optional.

778554

REST-API support: Expose max interface speed of all Ethernet ports on FortiAP.

779712

FortiAP would stop responding SNMP queries sometimes.

786273

Add Station RSSI and SNR inside Probe logs.

Note: FortiGate needs to run FOS 7.2.0 or later.

787499

Wireless clients were unable to complete authentication on the captive portal page.

790245

Sometimes, FortiAP could not reconnect to FortiLAN Cloud and received error message: "Too many DTLS setup failures 5. Restart wtp daemon".

790913

Add server IP/Name information to RADIUS, DNS and DHCP wireless event logs.

Note: FortiGate needs to run FOS 7.2.0 or later.

791692

When FAP-23JF is managed by FortiLAN Cloud, the LAN ports aren't actually down after configured to be offline.

Common vulnerabilities and exposures

FortiAP 7.0.4 is no longer vulnerable to the following common vulnerabilities and exposures (CVE) references:

Bug ID

Description

786638

CVE-2022-29058 (Command injection in CLI).

Visit https://fortiguard.com for more information.

Resolved issues

The following issues have been resolved in FortiAP version 7.0.4. For inquiries about a particular bug, visit the Fortinet Support website.

Bug ID

Description

606388

Sometimes, FortiGate would report SSIDs from authorized FortiAP devices as "fake-ap-on-air".

651452

The console port of FAP-231F, 234F and 23JF would occasionally lock-up.

711919

Probe requests and responses were not logged by 802.11ax-capable FortiAP models.

724927

FortiAP would take a long time to connect back to the WiFi Controller after implementing reboot from the FortiAP CLI.

767941

802.11ax clients got low throughput when connected to an SSID with PMF set to optional.

778554

REST-API support: Expose max interface speed of all Ethernet ports on FortiAP.

779712

FortiAP would stop responding SNMP queries sometimes.

786273

Add Station RSSI and SNR inside Probe logs.

Note: FortiGate needs to run FOS 7.2.0 or later.

787499

Wireless clients were unable to complete authentication on the captive portal page.

790245

Sometimes, FortiAP could not reconnect to FortiLAN Cloud and received error message: "Too many DTLS setup failures 5. Restart wtp daemon".

790913

Add server IP/Name information to RADIUS, DNS and DHCP wireless event logs.

Note: FortiGate needs to run FOS 7.2.0 or later.

791692

When FAP-23JF is managed by FortiLAN Cloud, the LAN ports aren't actually down after configured to be offline.

Common vulnerabilities and exposures

FortiAP 7.0.4 is no longer vulnerable to the following common vulnerabilities and exposures (CVE) references:

Bug ID

Description

786638

CVE-2022-29058 (Command injection in CLI).

Visit https://fortiguard.com for more information.