The following issues have been fixed in FortiClient (macOS) 6.2.1. For inquiries about a particular bug, contact Customer Service & Support.
||RTP cannot quarantine grayware.
||Inconsistency between macOS and Windows online status on EMS.
||Application Firewall causes slow
throughput on 1 Gbps connections.
||EMS settings for
should override similar FortiOS settings.
||FortiClient does not save the certificate.
||User can disconnect FortiClient (macOS) from EMS with a blank password.
||Unable to run manual autopatching for OS, web, and third party
||FortiClient SSL VPN connectivity issue to Cloudflare DNS services
126.96.36.199 when split tunnel is enabled.
||IPsec VPN fails to work on macOS Mojave.
||VPN certificate filter always chooses the first user info certificate
in the list.
||FortiClient does not have unique serial number.
FortiClient (macOS) deletes a file in additionally created in directory
||FortiClient forces password change before FortiGate local user password
||FortiClient fails to establish IPsec VPN if the wifi
network is switched.
FortiClient (macOS) cannot forget or remember the EMS list in the GUI.
||IPsec VPN rekey fails for system certificate ( XAuth disabled) with Racoon
||FortiClient unlocks settings after registering to EMS.
||FortiClient does not prompt for password to disconnect from EMS when EMS
profile enables it.
||Sandbox unauthorizes FortiClient (macOS) when it is registered to a FortiSandbox- authenticated EMS.
||FortiClient status is not connected when it is registered to EMS.
||FortiClient sends the FortiGate serial number to FortiAnalyzer in the EMS serial number field when FortiClient
is dual registered.
Common Vulnerabilities and Exposures
FortiClient (macOS) 6.2.1 is no longer vulnerable to the following
Visit https://fortiguard.com/psirt for more information.