Fortinet white logo
Fortinet white logo

Resolved issues

Resolved issues

The following issues have been fixed in version 7.2.5. For inquiries about a particular bug, contact Customer Service & Support.

Web Filter and plugin

Bug ID

Description

851700 FortiClient displays Microsoft Edge extension policy anomaly detected, please restart browser popup.
975694 FortiClient blocks Outlook and multiple destinations due unknown category error.
1008112 Web Filter blocks downloading some files in web.whatsapp.com and always shows block page.
1013487 Web Filter detects Webex as unrated and blocks it.
1036511 FortiClient (Windows) identifies ChatGPT as Informationstechnologie and not artificial intelligence.
1040592 FortiClient (Windows) requires restarting browser for browser plugin to work.

GUI

Bug ID

Description

981993 Remote Access GUI shows an incorrect message when FortiClient (Windows) is unregisters from EMS.
990496 FortiClient icon flickers on the taskbar and opens the console unexpectedly.
1011345 Cloud Sandbox is mistranslated in Slovak.

Endpoint control

Bug ID Description
821024 FortiClient fails to send username to EMS and causes EMS to report it as different users.
1007406 FortiClient on-Fabric public IP address rule does not accept subnets.
1045373 FortiClient installed using installer created on EMS does not automatically register if user profile has non-English characters.

Avatar and social login information

Bug ID

Description

950503 FortiClient does not use the image that the user uploaded as their avatar.
1026745 FortiClient console shows an incorrect avatar.

FSSOMA

Bug ID

Description

909844 User FortiClient single sign on mobile agent (FSSOMA) sessions drop earlier than expected.
964769 FSSOMA for Microsoft Entra ID does not send tenant ID to FortiAuthenticator.

Malware Protection and Sandbox

Bug ID

Description

820483 EMS device control does not block camera .
872970 Bubble notifications do not display when inserting USB drive in endpoint machine.
946756 EMS logs USB events when there is an allow rule configured.
988110 Sandbox fails to exclude trusted files from scanning if the file is in network folder.
996431 FortiClient (Windows) cannot block remote NDIS device cannot blocked when the net class device is set to block in Removable Media Access.
1005341 FortiClient stops reporting AV signatures to EMS when Malware Protection tab is hidden from EMS.
1032129 Sporadic network error occurs in Sandbox connection state.
1034857 FortiClient does not send file to FortiSandbox for analysis if the hashes are the same.

Install and upgrade

Bug ID

Description

1035052 FortiClient stops FortiMonitor agent service.
1057335 FortiAuthenticator agent breaks after FortiClient upgrade.

Logs

Bug ID

Description

996767 FortiAnalyzer does not show endpoints logs after endpoint upgrade from 7.0.9 to 7.2.3.
1007868 Web Filter blocked URL log does not include blocked website information.
1016032 FCDBLog consumes high memory.
1041193 FortiClient logging to FortiAnalyzer does not work using translated port.

Zero Trust tags

Bug ID

Description

956947 Zero Trust tags disappear from FortiClient (Windows) avatar page if a different user logs in to Windows machine.
988510 Windows operating system tag with latest update within 30 days does not work reliably.
1002079 Windows Security > Automatic Updates are enabled rule does not work as expected.

Vulnerability Scan

Bug ID

Description

913032 EMS does not update vulnerability events correctly after user performs Vulnerability Scan from FortiClient (Windows).
989431 Vulnerability Scan recognizes Windows 10 as Windows 11 (KB 5033375).

Remote Access

Bug ID

Description

933603 FortiClient (Windows) drops SSL VPN connection intermittently because of error 0x2747.
973808 For non-compliant endpoint using non-English OS, FortiClient (Windows) fails to show warning prompt when trying VPN connection.
997718 When FortiClient enables autoconnect, it behaves like always up.
1000706 VPN before Windows logon requires second attempt due to CachedLogonsCount issue.

1059326

VPN before logon fails with "Use Windows Credentials".

1062785

FortiClient truncates "domain/user" input during VPN authentication.

Remote Access - IPsec VPN

Bug ID

Description

740333 FortiClient modifies DNS settings of all network adapters.
758424 Certificate works for IPsec VPN tunnel if put in local computer but fails to work if in current user store.
969995 Autoconnect does not work reliably with IPsec VPN using username and password with one-time passcode and client certificate.
973544 IPsec VPN IKEv2 with SAML login does not support using external browser as user agent for authentication.
974215 Resilient IPsec VPN tunnel fails to connect if FortiClient (Windows) cannot reach first remote gateway.
995183 IPsec VPN V4-IKEv2 with RSA authentication asks for FortiToken when FortiGate has disabled multifactor authentication.
995970 Connecting from FortiTray when default tab is Remote Access has GUI issues.
997277 FortiClient autoconnects without autoconnect configured.
1002375 IPsec VPN <disclaimer_msg> option does not work.
1003780 IPsec VPN IKEv1 with certificate authentication has issues with connection when off-Fabric.

1005025

FortiClient notification "VPN blocked, please contact IT administrator" prompt again after clicking OK.

1005618 IPsec VPN fails to connect if R3 Intermediate certificate is not imported and ISRG Root X1 issued FortiGate server certificate.
1006236 FortiClient has IKEv2 fragmentation issue.
1021018 IPsec VPN before logon gets incorrect username or password when using Windows credentials.
1033835 After IPsec VPN full tunnel is up for three to four hours, FortiClient (Windows) starts failing to access the internet.

1070788

IPsec is disconnected immediately after tunnel is up sometimes when working from home using WiFi.

Remote Access - SSL VPN

Bug ID

Description

837391 FortiClient does not send public IP address for SAML, leading to 0.0.0.0 displaying on FortiOS and FortiSASE.
920953 SSL VPN tunnel intermittently fails to reconnect without authentication after a network disruption.
922941 Connecting to SSL VPN with FQDN resolving to both IPv4 and IPv6 as remote gateway gets stuck at 98%.
942668 Split DNS on SSL VPN only resolves the first DNS server.
961079 New Microsoft Teams application does not work if FortiClient (Windows) uses application-based split tunnel .
964036 Gateway selection based on ping speed or TCP round trip does not work.
970005 DNS over TCP does not work with FortiClient connected to FortiSASE and split DNS configured.
983216 FortiClient attempts to reconnect to VPN after authentication timeout expiry when tunnel-connect-without-reauth is enabled.

986416

FortiClient (Windows) always-up is not working when endpoint wakes up from sleep.

997010 FortiClient (Windows) fails to establish the SSL VPN tunnel to alternative server when primary server is down using Server method.
999205 Internal VPN browser is vulnerable for man in the middle attack.
1000589 VPN is stuck on connecting and error 6005 occurs if SAML takes longer than 60 seconds.

1002329

Auto-Connect when disconnecting from Dell Docking Station is not working.

1002456 After upgrade to 7.2.3, customized host check fail warning does not appear when tag is on device.
1006295 FortiClient fails to consistently connect at 40% with DNS round robin of FortiGates (SASE).
1007613 sslvpn-ems-sn-check error does not describe SAML SSL VPN connections.
1008116 After upgrade to 7.2.4, SAML VPN gets stuck at 0% with error (-6005) when certificate authority in user store.
1008932 FortiClient FortiSASE secure internet access (SIA) reconnect_without_reauthentication does not work.

1011367

Per-machine auto-connect takes longer time than expected.

1012434 FortiClient (Windows) does not save SAML VPN username when user closes internal SAML authentication window deliberately with <use_gui_saml_auth> enabled.
1015381 FortiClient takes longer than usual to autoconnect.
1016971 FortiClient fails to autoconnect and gets stuck in Connecting state until reboot.
1018126 WMIPRVSE.exe service CPU% spikes when connected to SIA VPN.
1019619 VPN always up fails to come up with split DNS configured.
1022827 FortiClient does not show any notification or popup message when user enters wrong credentials for VPN connection.

1023437

The VPN connection can not be established automatically after sleep and hibernate status.

1024973 SAML VPN is stuck in Connecting state when authentication times out.
1029584 FortiClient does not apply FortiOS SSL VPN custom hostcheck-error message rather than using default one always.

1034836

SSL VPN (without SAML) throws the credentials prompt repeatedly even if the correct credentials are shared.

1037133 FortiSASE VPN autoconnect takes longer time to reconnect after restarting FortiClient (Windows).
1038155 SSL VPN always up fails when both tunnel-connect-without-reauth and vpn-ems-sn-check are enabled.

1039560

FortiClient does not automatically reconnect to SSL VPN after FortiGate cluster failover.

1039896

Windows fails to auto-connect after switching network adapter.

1047738

After hibernation, users need to login twice for VPN connection to establish.

1049241

FortiClient does not connect daily and laptop has to be rebooted to connect again.

1049437

FortiClient connects to SSL VPN despite SSL VPN server certificate being revoked.

1052659

FortiClient gets stuck at 98% and is unable to reconnect when endpoint is left in standby for a couple of hours until reboot.

1063310

VPN fails to connect from FortiTray when SSL VPN and Allow non-admin to use machine certificate is configured.

1066122

VPN disconnects in some environment with Azure as SAML.

Zero Trust telemetry

Bug ID

Description

1055456 Endpoint reregisters to old FortiClient Cloud when using switch option.

Deployment and installers

Bug ID

Description

783690 Upgrade reboot prompt does not show after logging in to the endpoint to complete the installation.
1012187 Upgraded FortiClient installed features that are disabled in the EMS deployment package.
1058149 EMS shows Install Deployment Complete, but deployment did not upgrade some endpoints.

Performance

Bug ID

Description

1012529 FortiClient (Windows) constantly writes event files and cause CPU and overheating issues.

Real-time protection

Bug ID

Description

1036535 FortiClient (Windows) detects C:\PublishedSites\ files as threats and quarantines them.

PAM

Bug ID

Description

1001231 FortiPAM extension does not install automatically on Firefox.
1015585 Closing remaining running session in MobeXterm when launching a secret reaches the max session duration.

ZTNA connection rules

Bug ID

Description

831943 Zero trust network access (ZTNA) client certificate is not removed from user certificate store after uninstalling FortiClient (Windows).
919103 Clicking Settings > Clear Cookies removes manually added local ZTNA rules.
931275 ZTNA destination rules stop working.
976028 ZTNA wildcard in destination with format name*.domain.com does not work.
990864 When using SAML for ZTNA authentication, after closing the first session, the second session continues to request credentials.

1013466

FortiClient ZTNA destination for custom application with .NET8 Maui does not work as expected.

1022199

FortiClient endpoint fails to handle DNS request for IPv6 and Tkey packets.

1031633

ZTNA destinations not working when using SAP GUI (SapConsole).

1054366

VPN status is displayed incorecctly and ZTNA sometimes fails to pop up authentication.

Other

Bug ID

Description

984763 NETIO.SYS/FortiWF2.sys causes blue screens of death (BSOD) on Windows 10.
1006130 FortiShield.sys causes BSOD.
1053261 Antivirus drivers cause BSOD.

Common Vulnerabilities and Exposures

Bug ID

Description

1018712

FortiClient (Windows)7.2.5 is no longer vulnerable to the following CVE Reference:

  • CVE-2024-36513

Visit https://fortiguard.com/psirt for more information.

1043013

FortiClient (Windows) 7.2.5 is no longer vulnerable to the following CVE Reference:

  • CVE-2024-36507

Visit https://fortiguard.com/psirt for more information.

1043014

FortiClient (Windows) 7.2.5 is no longer vulnerable to the following CVE Reference:

  • CVE-2024-47574

Visit https://fortiguard.com/psirt for more information.

Resolved issues

Resolved issues

The following issues have been fixed in version 7.2.5. For inquiries about a particular bug, contact Customer Service & Support.

Web Filter and plugin

Bug ID

Description

851700 FortiClient displays Microsoft Edge extension policy anomaly detected, please restart browser popup.
975694 FortiClient blocks Outlook and multiple destinations due unknown category error.
1008112 Web Filter blocks downloading some files in web.whatsapp.com and always shows block page.
1013487 Web Filter detects Webex as unrated and blocks it.
1036511 FortiClient (Windows) identifies ChatGPT as Informationstechnologie and not artificial intelligence.
1040592 FortiClient (Windows) requires restarting browser for browser plugin to work.

GUI

Bug ID

Description

981993 Remote Access GUI shows an incorrect message when FortiClient (Windows) is unregisters from EMS.
990496 FortiClient icon flickers on the taskbar and opens the console unexpectedly.
1011345 Cloud Sandbox is mistranslated in Slovak.

Endpoint control

Bug ID Description
821024 FortiClient fails to send username to EMS and causes EMS to report it as different users.
1007406 FortiClient on-Fabric public IP address rule does not accept subnets.
1045373 FortiClient installed using installer created on EMS does not automatically register if user profile has non-English characters.

Avatar and social login information

Bug ID

Description

950503 FortiClient does not use the image that the user uploaded as their avatar.
1026745 FortiClient console shows an incorrect avatar.

FSSOMA

Bug ID

Description

909844 User FortiClient single sign on mobile agent (FSSOMA) sessions drop earlier than expected.
964769 FSSOMA for Microsoft Entra ID does not send tenant ID to FortiAuthenticator.

Malware Protection and Sandbox

Bug ID

Description

820483 EMS device control does not block camera .
872970 Bubble notifications do not display when inserting USB drive in endpoint machine.
946756 EMS logs USB events when there is an allow rule configured.
988110 Sandbox fails to exclude trusted files from scanning if the file is in network folder.
996431 FortiClient (Windows) cannot block remote NDIS device cannot blocked when the net class device is set to block in Removable Media Access.
1005341 FortiClient stops reporting AV signatures to EMS when Malware Protection tab is hidden from EMS.
1032129 Sporadic network error occurs in Sandbox connection state.
1034857 FortiClient does not send file to FortiSandbox for analysis if the hashes are the same.

Install and upgrade

Bug ID

Description

1035052 FortiClient stops FortiMonitor agent service.
1057335 FortiAuthenticator agent breaks after FortiClient upgrade.

Logs

Bug ID

Description

996767 FortiAnalyzer does not show endpoints logs after endpoint upgrade from 7.0.9 to 7.2.3.
1007868 Web Filter blocked URL log does not include blocked website information.
1016032 FCDBLog consumes high memory.
1041193 FortiClient logging to FortiAnalyzer does not work using translated port.

Zero Trust tags

Bug ID

Description

956947 Zero Trust tags disappear from FortiClient (Windows) avatar page if a different user logs in to Windows machine.
988510 Windows operating system tag with latest update within 30 days does not work reliably.
1002079 Windows Security > Automatic Updates are enabled rule does not work as expected.

Vulnerability Scan

Bug ID

Description

913032 EMS does not update vulnerability events correctly after user performs Vulnerability Scan from FortiClient (Windows).
989431 Vulnerability Scan recognizes Windows 10 as Windows 11 (KB 5033375).

Remote Access

Bug ID

Description

933603 FortiClient (Windows) drops SSL VPN connection intermittently because of error 0x2747.
973808 For non-compliant endpoint using non-English OS, FortiClient (Windows) fails to show warning prompt when trying VPN connection.
997718 When FortiClient enables autoconnect, it behaves like always up.
1000706 VPN before Windows logon requires second attempt due to CachedLogonsCount issue.

1059326

VPN before logon fails with "Use Windows Credentials".

1062785

FortiClient truncates "domain/user" input during VPN authentication.

Remote Access - IPsec VPN

Bug ID

Description

740333 FortiClient modifies DNS settings of all network adapters.
758424 Certificate works for IPsec VPN tunnel if put in local computer but fails to work if in current user store.
969995 Autoconnect does not work reliably with IPsec VPN using username and password with one-time passcode and client certificate.
973544 IPsec VPN IKEv2 with SAML login does not support using external browser as user agent for authentication.
974215 Resilient IPsec VPN tunnel fails to connect if FortiClient (Windows) cannot reach first remote gateway.
995183 IPsec VPN V4-IKEv2 with RSA authentication asks for FortiToken when FortiGate has disabled multifactor authentication.
995970 Connecting from FortiTray when default tab is Remote Access has GUI issues.
997277 FortiClient autoconnects without autoconnect configured.
1002375 IPsec VPN <disclaimer_msg> option does not work.
1003780 IPsec VPN IKEv1 with certificate authentication has issues with connection when off-Fabric.

1005025

FortiClient notification "VPN blocked, please contact IT administrator" prompt again after clicking OK.

1005618 IPsec VPN fails to connect if R3 Intermediate certificate is not imported and ISRG Root X1 issued FortiGate server certificate.
1006236 FortiClient has IKEv2 fragmentation issue.
1021018 IPsec VPN before logon gets incorrect username or password when using Windows credentials.
1033835 After IPsec VPN full tunnel is up for three to four hours, FortiClient (Windows) starts failing to access the internet.

1070788

IPsec is disconnected immediately after tunnel is up sometimes when working from home using WiFi.

Remote Access - SSL VPN

Bug ID

Description

837391 FortiClient does not send public IP address for SAML, leading to 0.0.0.0 displaying on FortiOS and FortiSASE.
920953 SSL VPN tunnel intermittently fails to reconnect without authentication after a network disruption.
922941 Connecting to SSL VPN with FQDN resolving to both IPv4 and IPv6 as remote gateway gets stuck at 98%.
942668 Split DNS on SSL VPN only resolves the first DNS server.
961079 New Microsoft Teams application does not work if FortiClient (Windows) uses application-based split tunnel .
964036 Gateway selection based on ping speed or TCP round trip does not work.
970005 DNS over TCP does not work with FortiClient connected to FortiSASE and split DNS configured.
983216 FortiClient attempts to reconnect to VPN after authentication timeout expiry when tunnel-connect-without-reauth is enabled.

986416

FortiClient (Windows) always-up is not working when endpoint wakes up from sleep.

997010 FortiClient (Windows) fails to establish the SSL VPN tunnel to alternative server when primary server is down using Server method.
999205 Internal VPN browser is vulnerable for man in the middle attack.
1000589 VPN is stuck on connecting and error 6005 occurs if SAML takes longer than 60 seconds.

1002329

Auto-Connect when disconnecting from Dell Docking Station is not working.

1002456 After upgrade to 7.2.3, customized host check fail warning does not appear when tag is on device.
1006295 FortiClient fails to consistently connect at 40% with DNS round robin of FortiGates (SASE).
1007613 sslvpn-ems-sn-check error does not describe SAML SSL VPN connections.
1008116 After upgrade to 7.2.4, SAML VPN gets stuck at 0% with error (-6005) when certificate authority in user store.
1008932 FortiClient FortiSASE secure internet access (SIA) reconnect_without_reauthentication does not work.

1011367

Per-machine auto-connect takes longer time than expected.

1012434 FortiClient (Windows) does not save SAML VPN username when user closes internal SAML authentication window deliberately with <use_gui_saml_auth> enabled.
1015381 FortiClient takes longer than usual to autoconnect.
1016971 FortiClient fails to autoconnect and gets stuck in Connecting state until reboot.
1018126 WMIPRVSE.exe service CPU% spikes when connected to SIA VPN.
1019619 VPN always up fails to come up with split DNS configured.
1022827 FortiClient does not show any notification or popup message when user enters wrong credentials for VPN connection.

1023437

The VPN connection can not be established automatically after sleep and hibernate status.

1024973 SAML VPN is stuck in Connecting state when authentication times out.
1029584 FortiClient does not apply FortiOS SSL VPN custom hostcheck-error message rather than using default one always.

1034836

SSL VPN (without SAML) throws the credentials prompt repeatedly even if the correct credentials are shared.

1037133 FortiSASE VPN autoconnect takes longer time to reconnect after restarting FortiClient (Windows).
1038155 SSL VPN always up fails when both tunnel-connect-without-reauth and vpn-ems-sn-check are enabled.

1039560

FortiClient does not automatically reconnect to SSL VPN after FortiGate cluster failover.

1039896

Windows fails to auto-connect after switching network adapter.

1047738

After hibernation, users need to login twice for VPN connection to establish.

1049241

FortiClient does not connect daily and laptop has to be rebooted to connect again.

1049437

FortiClient connects to SSL VPN despite SSL VPN server certificate being revoked.

1052659

FortiClient gets stuck at 98% and is unable to reconnect when endpoint is left in standby for a couple of hours until reboot.

1063310

VPN fails to connect from FortiTray when SSL VPN and Allow non-admin to use machine certificate is configured.

1066122

VPN disconnects in some environment with Azure as SAML.

Zero Trust telemetry

Bug ID

Description

1055456 Endpoint reregisters to old FortiClient Cloud when using switch option.

Deployment and installers

Bug ID

Description

783690 Upgrade reboot prompt does not show after logging in to the endpoint to complete the installation.
1012187 Upgraded FortiClient installed features that are disabled in the EMS deployment package.
1058149 EMS shows Install Deployment Complete, but deployment did not upgrade some endpoints.

Performance

Bug ID

Description

1012529 FortiClient (Windows) constantly writes event files and cause CPU and overheating issues.

Real-time protection

Bug ID

Description

1036535 FortiClient (Windows) detects C:\PublishedSites\ files as threats and quarantines them.

PAM

Bug ID

Description

1001231 FortiPAM extension does not install automatically on Firefox.
1015585 Closing remaining running session in MobeXterm when launching a secret reaches the max session duration.

ZTNA connection rules

Bug ID

Description

831943 Zero trust network access (ZTNA) client certificate is not removed from user certificate store after uninstalling FortiClient (Windows).
919103 Clicking Settings > Clear Cookies removes manually added local ZTNA rules.
931275 ZTNA destination rules stop working.
976028 ZTNA wildcard in destination with format name*.domain.com does not work.
990864 When using SAML for ZTNA authentication, after closing the first session, the second session continues to request credentials.

1013466

FortiClient ZTNA destination for custom application with .NET8 Maui does not work as expected.

1022199

FortiClient endpoint fails to handle DNS request for IPv6 and Tkey packets.

1031633

ZTNA destinations not working when using SAP GUI (SapConsole).

1054366

VPN status is displayed incorecctly and ZTNA sometimes fails to pop up authentication.

Other

Bug ID

Description

984763 NETIO.SYS/FortiWF2.sys causes blue screens of death (BSOD) on Windows 10.
1006130 FortiShield.sys causes BSOD.
1053261 Antivirus drivers cause BSOD.

Common Vulnerabilities and Exposures

Bug ID

Description

1018712

FortiClient (Windows)7.2.5 is no longer vulnerable to the following CVE Reference:

  • CVE-2024-36513

Visit https://fortiguard.com/psirt for more information.

1043013

FortiClient (Windows) 7.2.5 is no longer vulnerable to the following CVE Reference:

  • CVE-2024-36507

Visit https://fortiguard.com/psirt for more information.

1043014

FortiClient (Windows) 7.2.5 is no longer vulnerable to the following CVE Reference:

  • CVE-2024-47574

Visit https://fortiguard.com/psirt for more information.