Fortinet Document Library

Version:

Version:

Version:

Version:

Version:

Version:


Table of Contents

Resolved issues

The following issues have been fixed in version 3.2.0. For inquires about a particular bug, please contact Customer Service & Support.

Bug ID

Description

511880

NFR: Decoy Environment learning & discovery.

593881

When GUI session times out, all action should redirect to login page, not error message.

637094

Change password: Canceling redirects to admin page for user with no privilege.

637748

FortiDeceptor DMZ mode change does not write syslog.

638102

NFR: Format the display and provide download link for tcplistener data.

638842

NFR: Lure Content Learn and auto generator.

638846

NFR: Implement auto deployment mechanism for deception VM deployment feature.

638848

NFR: Implement new GUI page with animation to support the auto discovery/deployment feature.

639818

FortiDeceptor: Crafted username does not trigger login attempt limit.

641992

Incident Analysis event format changes on GUI.

642117

NFR: FortiOS / 3rd party blocking via webhook.

642119

NFR: GUI need to design/implement new GUI page to retrieve the input data for blocking web hook gateway.

648619

NFR: Support web proxy for external network access for firmware.

654326

CLI: Improve the fw-upgrade command to support downloading the VM images via HTTPS protocol.

654400

Major security exposure that allow Threat Actor to Bypass FortiDeceptor.

657746

Improve AV dump file download.

658297

Improve the Incidents View page to provide new option to review Interaction Events Only.

660645

NFR: Add Decoy last start time to decoy status page.

669775

NFR: Support uploading deception OS image via GUI.

669778

Improve the dashboard to avoid the long wait time when FortiDeceptor is deployed in offline network.

669783

Deployment network monitor IP address need to be verified exclusive.

670637

Readonly admin can edit/delete on lure resource page.

672189

Replace whitelist with safelist in all places.

672269

Customization page has Command Injection vulnerability.

Resolved issues

The following issues have been fixed in version 3.2.0. For inquires about a particular bug, please contact Customer Service & Support.

Bug ID

Description

511880

NFR: Decoy Environment learning & discovery.

593881

When GUI session times out, all action should redirect to login page, not error message.

637094

Change password: Canceling redirects to admin page for user with no privilege.

637748

FortiDeceptor DMZ mode change does not write syslog.

638102

NFR: Format the display and provide download link for tcplistener data.

638842

NFR: Lure Content Learn and auto generator.

638846

NFR: Implement auto deployment mechanism for deception VM deployment feature.

638848

NFR: Implement new GUI page with animation to support the auto discovery/deployment feature.

639818

FortiDeceptor: Crafted username does not trigger login attempt limit.

641992

Incident Analysis event format changes on GUI.

642117

NFR: FortiOS / 3rd party blocking via webhook.

642119

NFR: GUI need to design/implement new GUI page to retrieve the input data for blocking web hook gateway.

648619

NFR: Support web proxy for external network access for firmware.

654326

CLI: Improve the fw-upgrade command to support downloading the VM images via HTTPS protocol.

654400

Major security exposure that allow Threat Actor to Bypass FortiDeceptor.

657746

Improve AV dump file download.

658297

Improve the Incidents View page to provide new option to review Interaction Events Only.

660645

NFR: Add Decoy last start time to decoy status page.

669775

NFR: Support uploading deception OS image via GUI.

669778

Improve the dashboard to avoid the long wait time when FortiDeceptor is deployed in offline network.

669783

Deployment network monitor IP address need to be verified exclusive.

670637

Readonly admin can edit/delete on lure resource page.

672189

Replace whitelist with safelist in all places.

672269

Customization page has Command Injection vulnerability.