Fortinet white logo
Fortinet white logo

Resolved issues

Resolved issues

The following issues have been fixed in version 7.2.9. For inquiries about a particular bug, contact Customer Service & Support.

Deployment and installers

Bug ID

Description

1104334 Deployment messages is in English for PC with the local language not set to English.
1113057 Install does not follow unsupervised scheduled deployment time.

Endpoint control

Bug ID Description
1023729 When detecting Fortinet Security Fabric status via DHCP code, local subnet does not work as expected after connecting to VPN.
1087936 EMS disconnect password with special characters does not work.

Install and upgrade

Bug ID

Description

995379 Fortinet single sign on mobility agent does not properly install on CIS hardened Windows 10 and 11 image.

Remote Access

Bug ID

Description

706804 Disabling local LAN access does not restrict remote access.
1027199 FortiClient (Windows) does not log in to system when using SAML VPN before logon.
1051036 FortiClient (Windows) 7.2 does not support IPsec VPN SAML authentication using Electron and must support before logon and after logon scenarios.
1109326 <keep_fqdn_resolution_consistency>1</keep_fqdn_resolution_consistency> appends entry to same line in hosts file.
1111890 VPN before logon fails to login to hybrid joined Windows as FortiClient (Windows) uses incorrect username format(username@azure_domain).

Remote Access - IPsec VPN

Bug ID

Description

1085855 Saved password becomes empty after reboot when multifactor authentication (MFA), autoconnect, and client certificate are enabled on IPsec VPN.
1091700 High volume of LDAP traffic occurs when endpoint is connected to tunnel.
1099714 When connecting to IPsec VPN with RADIUS authentication (Microsoft Entra ID), FortiClient (Windows) clears password field when asking for MFA.
1099737 Excessive FortiClient LDAP queries occur.
1101972 Speed on dialup IPsec VPN with GCM cipher is lower compared to AES256.
1121089 Listening IP address changes when connected to IPsec VPN.
1123378 Abnormal FortiClient (Windows) dead peer detection behavior occurs after FortiClient phase 1 IKE SA is rekeyed (FortiClient (Windows) sending create-child request).
1126275 Performance issues (limited maximum throughput) occur on IPsec VPN dialup with phase 2 AES-GCM.

Remote Access - SSL VPN

Bug ID

Description

786869 FortiClient (Windows) does not support changing SSL VPN virtual adapter MTU dynamically via EMS configuration.
1070783 VPN cannot connect. After successful authentication, it redirects to the connect page multiple times.
1085875 FortiClient ignores partial certificate filters and requires both common name and issuer XML tags.
1101287 SSL certificate warning displays for valid certificates if switching between valid certificates in FortiGate.
1103361 FortiClient (Windows) fails to autoconnect after deploying FortiClient (Windows) on Windows machine that enabled passwordless automatic login.
1105603 VPN does not autoconnect when automatic login is enabled on Windows endpoint.
1110569 FortiClient (Windows) connects to pre-login tunnel after user logs in and connects to telemetry.
1111300 SSL VPN tunnel does not connect for almost 15 minutes when coming from sleep mode.
1111305 Autoconnect triggers when endpoint wakes from sleep or powers on in on-Fabric location.
1113004 SSL VPN gets stuck on 98% if hostname contains characters with umlauts, such as ä, ö, or ü.

Zero trust network access connection rules

Bug ID

Description

1130065 fortitransctrl.sys causes blue screen of death.

Zero Trust tags

Bug ID

Description

1103074 If Zero Trust tag Tag_C is configured as applying to endpoints that are tagged with Tag_A and Tag_B, endpoint that is tagged with Tag_A and Tag_B is missing Tag_C.

Other

Bug ID

Description

1131418 Diagnostic file retrieved from the client via FortiClient Cloud is corrupted.

Common Vulnerabilities and Exposures

FortiClient (Windows) 7.2.9 is no longer vulnerable to the following CVE reference. Visit https://fortiguard.com/psirt for more information.

Bug ID Description

1129740

CVE-2025-46373

Resolved issues

Resolved issues

The following issues have been fixed in version 7.2.9. For inquiries about a particular bug, contact Customer Service & Support.

Deployment and installers

Bug ID

Description

1104334 Deployment messages is in English for PC with the local language not set to English.
1113057 Install does not follow unsupervised scheduled deployment time.

Endpoint control

Bug ID Description
1023729 When detecting Fortinet Security Fabric status via DHCP code, local subnet does not work as expected after connecting to VPN.
1087936 EMS disconnect password with special characters does not work.

Install and upgrade

Bug ID

Description

995379 Fortinet single sign on mobility agent does not properly install on CIS hardened Windows 10 and 11 image.

Remote Access

Bug ID

Description

706804 Disabling local LAN access does not restrict remote access.
1027199 FortiClient (Windows) does not log in to system when using SAML VPN before logon.
1051036 FortiClient (Windows) 7.2 does not support IPsec VPN SAML authentication using Electron and must support before logon and after logon scenarios.
1109326 <keep_fqdn_resolution_consistency>1</keep_fqdn_resolution_consistency> appends entry to same line in hosts file.
1111890 VPN before logon fails to login to hybrid joined Windows as FortiClient (Windows) uses incorrect username format(username@azure_domain).

Remote Access - IPsec VPN

Bug ID

Description

1085855 Saved password becomes empty after reboot when multifactor authentication (MFA), autoconnect, and client certificate are enabled on IPsec VPN.
1091700 High volume of LDAP traffic occurs when endpoint is connected to tunnel.
1099714 When connecting to IPsec VPN with RADIUS authentication (Microsoft Entra ID), FortiClient (Windows) clears password field when asking for MFA.
1099737 Excessive FortiClient LDAP queries occur.
1101972 Speed on dialup IPsec VPN with GCM cipher is lower compared to AES256.
1121089 Listening IP address changes when connected to IPsec VPN.
1123378 Abnormal FortiClient (Windows) dead peer detection behavior occurs after FortiClient phase 1 IKE SA is rekeyed (FortiClient (Windows) sending create-child request).
1126275 Performance issues (limited maximum throughput) occur on IPsec VPN dialup with phase 2 AES-GCM.

Remote Access - SSL VPN

Bug ID

Description

786869 FortiClient (Windows) does not support changing SSL VPN virtual adapter MTU dynamically via EMS configuration.
1070783 VPN cannot connect. After successful authentication, it redirects to the connect page multiple times.
1085875 FortiClient ignores partial certificate filters and requires both common name and issuer XML tags.
1101287 SSL certificate warning displays for valid certificates if switching between valid certificates in FortiGate.
1103361 FortiClient (Windows) fails to autoconnect after deploying FortiClient (Windows) on Windows machine that enabled passwordless automatic login.
1105603 VPN does not autoconnect when automatic login is enabled on Windows endpoint.
1110569 FortiClient (Windows) connects to pre-login tunnel after user logs in and connects to telemetry.
1111300 SSL VPN tunnel does not connect for almost 15 minutes when coming from sleep mode.
1111305 Autoconnect triggers when endpoint wakes from sleep or powers on in on-Fabric location.
1113004 SSL VPN gets stuck on 98% if hostname contains characters with umlauts, such as ä, ö, or ü.

Zero trust network access connection rules

Bug ID

Description

1130065 fortitransctrl.sys causes blue screen of death.

Zero Trust tags

Bug ID

Description

1103074 If Zero Trust tag Tag_C is configured as applying to endpoints that are tagged with Tag_A and Tag_B, endpoint that is tagged with Tag_A and Tag_B is missing Tag_C.

Other

Bug ID

Description

1131418 Diagnostic file retrieved from the client via FortiClient Cloud is corrupted.

Common Vulnerabilities and Exposures

FortiClient (Windows) 7.2.9 is no longer vulnerable to the following CVE reference. Visit https://fortiguard.com/psirt for more information.

Bug ID Description

1129740

CVE-2025-46373