Resolved issues
The following issues have been fixed in version 3.2.0. For inquires about a particular bug, please contact Customer Service & Support.
Bug ID |
Description |
---|---|
511880 |
NFR: Decoy Environment learning & discovery. |
593881 |
When GUI session times out, all action should redirect to login page, not error message. |
637094 |
Change password: Canceling redirects to admin page for user with no privilege. |
637748 |
FortiDeceptor DMZ mode change does not write syslog. |
638102 |
NFR: Format the display and provide download link for |
638842 |
NFR: Lure Content Learn and auto generator. |
638846 |
NFR: Implement auto deployment mechanism for deception VM deployment feature. |
638848 |
NFR: Implement new GUI page with animation to support the auto discovery/deployment feature. |
639818 |
FortiDeceptor: Crafted username does not trigger login attempt limit. |
641992 |
Incident Analysis event format changes on GUI. |
642117 |
NFR: FortiOS / 3rd party blocking via webhook. |
642119 |
NFR: GUI need to design/implement new GUI page to retrieve the input data for blocking web hook gateway. |
648619 |
NFR: Support web proxy for external network access for firmware. |
654326 |
CLI: Improve the |
654400 |
Major security exposure that allow Threat Actor to Bypass FortiDeceptor. |
657746 |
Improve AV dump file download. |
658297 |
Improve the Incidents View page to provide new option to review Interaction Events Only. |
660645 |
NFR: Add Decoy last start time to decoy status page. |
669775 |
NFR: Support uploading deception OS image via GUI. |
669778 |
Improve the dashboard to avoid the long wait time when FortiDeceptor is deployed in offline network. |
669783 |
Deployment network monitor IP address need to be verified exclusive. |
670637 |
Readonly admin can edit/delete on lure resource page. |
672189 |
Replace whitelist with safelist in all places. |
672269 |
Customization page has Command Injection vulnerability. |