Fortinet white logo
Fortinet white logo

Resolved issues

Resolved issues

The following issues have been fixed in version 6.0.6. For inquiries about a particular bug, contact Customer Service & Support.

Endpoint control

Bug ID

Description

538267 FortiClient (Windows) fails to create a scheduled vcm scan when EMS has enabled the maintenance setting.
553977 FortiClient (Windows) always sends previous avatar image to EMS when using the OS avatar.
554236 FortiClient (Windows) reports that it is connected to the FortiGate after the FortiGate changes the registration port.

Malware Protection

Bug ID

Description

460508

FortiClient does not run AV scan upon USB insertion after reboot.

460980

Sandbox still submits and quarantines files in the Sandbox exclusion list (network drive).

513213

AntiExploit Engine blocks legitimate applications.

516841

Sandbox still holds files with sizes larger than 200 MB until timeout.

548918

FortiClient AV causes high CPU usage on endpoints.

550607 FortiClient AV feature reports back to EMS as enabled when it is hidden.

Web Filter

Bug ID

Description

529450

FortiClient shows Unrated for HTTPS sites while it shows the correct category for HTTP sites.

546525

FortiClient (Windows) blocks web traffic due to two FortiProxy services running at the same time.

Application Firewall

Bug ID

Description

526997 Application Firewall blocks web-based applications and lsass.exe and flags them as Psiphon.

538780

FortiClient prevents Google file stream from running properly and causes high CPU and memory usage.

Remote Access

Bug ID

Description

520808

FortiClient fails certificate validation due to an ignored intermediate certificate authority.

525449 A JavaScript error occurs while connecting to VPN. The issue occurs due to an admin roaming profile.

525542

After laptop boot or wakeup, FortiClient (Windows) tries to autoconnect even though it is onnet.

532068

FortiClient cannot see the certificate when the certificate subject contain diacritics.

534650

<allow_standard_user_use_system_cert> does not work for SSL IPv6.

534814

FortiClient (Windows) fails to install multiple IPv4 split tunnel routes.

534845

FortiClient (Windows) does not show certificate dropdown after restore.

535114

The user is unable to select a user certificate when reconnecting to a managed SSL VPN profile.

537091

FortiClient (Windows) only allows twelve seconds to key in the token when using a multiple gateway setup and connecting to SSL VPN with 2FA enabled.

537559 Password change does not work for IPsec dialup users with two-factor authentication (2FA) enabled.
539387 VPN autodial does not work when using the domain name to register to EMS.
540588 Windows 10 hosts file gets garbled letters and grows larger with SSL VPN remote traffic.
541420 The user cannot log into Windows after enabling VPN before logon.
541424 VPN autoconnect only when off-net issue when EMS packages the installer.
549311 VPN before logon using only LDAP-integrated certificates does not connect.
551236 Default route is missing after connecting IPsec VPN with FortiOS 5.6.X.

551538

Onnet FortiClient triggers VPN autoconnect after system reboot even when autoconnect only when offnet is enabled.

551919

Fails to reconnect from FortiTray if username has backslash or domain user format.

Vulnerability Scan

Bug ID

Description

534954 FortiClient fails to use Install Selected to patch OS vulnerabilities.
547482 Java Runtime Environment vulnerability exemption does not exempt endpoints from compliance.

Install and upgrade

Bug ID

Description

510748 If FortiClient (Windows) is installed on a different drive (E:\), manual upgrade to 6.0.x completes but FortiClient (Windows) does not work after reboot.
551586 EMS uninstaller fails to remove all FortiClient files and registry in HKCU.

557098

FortiClient (Windows) online installer failed to trigger AV scan on clean system.

Other

Bug ID

Description

450181 FortiClient makes connections to FortiGuard servers even when Web Filter/FortiProxy are disabled.
494257 The user cannot execute FortiClientVirusCleaner in the tool set.
513311 FortiAptFilter causes a blue screen of death.
545427 FortiClient scheduled daily update from Micro-FortiGuard Server for FortiClient communicates to Micro-FortiGuard Server for FortiClient very frequently.

553328

FortiClientOfflineVirusCleaner issue.

Common vulnerabilities and exposures
Bug ID Description

433685

FortiClient (Windows) is no longer vulnerable to the following CVE reference:
  • 2019-5589

Visit https://fortiguard.com/psirt for more information.

Resolved issues

Resolved issues

The following issues have been fixed in version 6.0.6. For inquiries about a particular bug, contact Customer Service & Support.

Endpoint control

Bug ID

Description

538267 FortiClient (Windows) fails to create a scheduled vcm scan when EMS has enabled the maintenance setting.
553977 FortiClient (Windows) always sends previous avatar image to EMS when using the OS avatar.
554236 FortiClient (Windows) reports that it is connected to the FortiGate after the FortiGate changes the registration port.

Malware Protection

Bug ID

Description

460508

FortiClient does not run AV scan upon USB insertion after reboot.

460980

Sandbox still submits and quarantines files in the Sandbox exclusion list (network drive).

513213

AntiExploit Engine blocks legitimate applications.

516841

Sandbox still holds files with sizes larger than 200 MB until timeout.

548918

FortiClient AV causes high CPU usage on endpoints.

550607 FortiClient AV feature reports back to EMS as enabled when it is hidden.

Web Filter

Bug ID

Description

529450

FortiClient shows Unrated for HTTPS sites while it shows the correct category for HTTP sites.

546525

FortiClient (Windows) blocks web traffic due to two FortiProxy services running at the same time.

Application Firewall

Bug ID

Description

526997 Application Firewall blocks web-based applications and lsass.exe and flags them as Psiphon.

538780

FortiClient prevents Google file stream from running properly and causes high CPU and memory usage.

Remote Access

Bug ID

Description

520808

FortiClient fails certificate validation due to an ignored intermediate certificate authority.

525449 A JavaScript error occurs while connecting to VPN. The issue occurs due to an admin roaming profile.

525542

After laptop boot or wakeup, FortiClient (Windows) tries to autoconnect even though it is onnet.

532068

FortiClient cannot see the certificate when the certificate subject contain diacritics.

534650

<allow_standard_user_use_system_cert> does not work for SSL IPv6.

534814

FortiClient (Windows) fails to install multiple IPv4 split tunnel routes.

534845

FortiClient (Windows) does not show certificate dropdown after restore.

535114

The user is unable to select a user certificate when reconnecting to a managed SSL VPN profile.

537091

FortiClient (Windows) only allows twelve seconds to key in the token when using a multiple gateway setup and connecting to SSL VPN with 2FA enabled.

537559 Password change does not work for IPsec dialup users with two-factor authentication (2FA) enabled.
539387 VPN autodial does not work when using the domain name to register to EMS.
540588 Windows 10 hosts file gets garbled letters and grows larger with SSL VPN remote traffic.
541420 The user cannot log into Windows after enabling VPN before logon.
541424 VPN autoconnect only when off-net issue when EMS packages the installer.
549311 VPN before logon using only LDAP-integrated certificates does not connect.
551236 Default route is missing after connecting IPsec VPN with FortiOS 5.6.X.

551538

Onnet FortiClient triggers VPN autoconnect after system reboot even when autoconnect only when offnet is enabled.

551919

Fails to reconnect from FortiTray if username has backslash or domain user format.

Vulnerability Scan

Bug ID

Description

534954 FortiClient fails to use Install Selected to patch OS vulnerabilities.
547482 Java Runtime Environment vulnerability exemption does not exempt endpoints from compliance.

Install and upgrade

Bug ID

Description

510748 If FortiClient (Windows) is installed on a different drive (E:\), manual upgrade to 6.0.x completes but FortiClient (Windows) does not work after reboot.
551586 EMS uninstaller fails to remove all FortiClient files and registry in HKCU.

557098

FortiClient (Windows) online installer failed to trigger AV scan on clean system.

Other

Bug ID

Description

450181 FortiClient makes connections to FortiGuard servers even when Web Filter/FortiProxy are disabled.
494257 The user cannot execute FortiClientVirusCleaner in the tool set.
513311 FortiAptFilter causes a blue screen of death.
545427 FortiClient scheduled daily update from Micro-FortiGuard Server for FortiClient communicates to Micro-FortiGuard Server for FortiClient very frequently.

553328

FortiClientOfflineVirusCleaner issue.

Common vulnerabilities and exposures
Bug ID Description

433685

FortiClient (Windows) is no longer vulnerable to the following CVE reference:
  • 2019-5589

Visit https://fortiguard.com/psirt for more information.