Fortinet black logo

Resolved issues

Copy Link
Copy Doc ID 1ffd2727-602f-11eb-b9ad-00505692583a:347184
Download PDF

Resolved issues

The following issues have been fixed in version 3.3.0. For inquires about a particular bug, please contact Customer Service & Support.

Bug ID

Description

675622

Verify confirmation-id to numeric characters only for Windows license confirmation over phone activation.

675747

Implement Central Management support for FortiDeceptor.

574623

Fabric Pairing - Add FortiDeceptor as fabric device on FortiGate.

675753

Prepare and publish new deception OS for medical.

675754

Prepare and publish new deception OS for POS device.

675755

Prepare and publish new deception OS for ERP device.

675750

HTTP service support on Linux.

688177

Support GIT service on Linux decoy.

686346

Support IIS server on customized Windows Server 2016/2019.

682516

Support different sets of decoy services for SCADA for different purposes.

675752

Windows deception lure redesign (SMB).

676194

Cache credential lures.

676197

Support ARP lure in lure installation on endpoint.

686345

Lure token package installer should delete itself after the installation is finished.

690707

Display token information in the deception map as previously.

655870

Verify FDS server with CA2 certificate and download packages over HTTPS protocol.

675751

MAC address modification in deploy wizard GUI.

676043

For the new security compliance, use the domain in the URL to access new VM image server.

616794

Add subnet support in Safe List.

700966

VNC icon should be disabled for built-in decoy images.

684100

Add a new Type level to incident alert.

691043

Out-of-bounds array indexing in system-install.

691044

Race condition vulnerability in command shell.

691052

Uncontrolled resource consumption (unauthenticated denial of service) in login module.

700707

Increase the default HDD size for FortiDeceptor VM model from 200GB to 500GB.

704731

Disable or set as readonly the deception menu on client appliances.

703937

Email does not work on the relay server that is restricted to verifying the host name in EHLO command.

701901

Decoy deploy stuck in starting status when decoy number reaches the limit and all the decoys try to launch.

702308

Decoy template can be saved many times.

672826

Improve performance of CLI data-purge command.

704681

Lure generator does not use the given user names.

706619

Lure generator does not use the user imported resource file.

684102

Default admin user cannot update the trusted host configuration.

675622

Verify confirmation-id to numeric characters only.

576167

dcimg-status should show uninitialized deception OS.

685536

System time change affects Windows variety decoy keepalive functionality.

523262

Static mode all IP addresses of gateway and IP range should be in the same subnet of selected monitor VLAN or subnet.

698087

Provide download button for the imported LDAP users.

659719

Verify that custom ports do not conflict with each other.

675241

Deception OS page shows empty list on bootup even after proper network configuration.

702318

When overwrite is not enabled, allow overwrite server address to be empty.

704023

CM Manager should show CM related info in secure Fabric widget.

681427

When deception OS does not have a license, the deployed decoy cannot be deleted.

681894

Command injection vulnerability caused by call function in subprocess.

683253

Software version tracking.

677286

Vulnerability for FortiDeceptor GUI.

707651

Import lure user from LDAP page needs to provide CA certificate dropdown list, not text field.

707304

Force refresh whole page or logout session when switching mode.

703864

Analysis-Export to PDF download failed / content overflow.

685336

Remote admin user auth test mixed with local trusthost verification.

706621

The hostname generated by automated lure process should be valid.

707285

RDP and SMB detection issues with Cus Win join AD.

707327

Ubuntu Samba service: the event operation type needs to be more specific.

Resolved issues

The following issues have been fixed in version 3.3.0. For inquires about a particular bug, please contact Customer Service & Support.

Bug ID

Description

675622

Verify confirmation-id to numeric characters only for Windows license confirmation over phone activation.

675747

Implement Central Management support for FortiDeceptor.

574623

Fabric Pairing - Add FortiDeceptor as fabric device on FortiGate.

675753

Prepare and publish new deception OS for medical.

675754

Prepare and publish new deception OS for POS device.

675755

Prepare and publish new deception OS for ERP device.

675750

HTTP service support on Linux.

688177

Support GIT service on Linux decoy.

686346

Support IIS server on customized Windows Server 2016/2019.

682516

Support different sets of decoy services for SCADA for different purposes.

675752

Windows deception lure redesign (SMB).

676194

Cache credential lures.

676197

Support ARP lure in lure installation on endpoint.

686345

Lure token package installer should delete itself after the installation is finished.

690707

Display token information in the deception map as previously.

655870

Verify FDS server with CA2 certificate and download packages over HTTPS protocol.

675751

MAC address modification in deploy wizard GUI.

676043

For the new security compliance, use the domain in the URL to access new VM image server.

616794

Add subnet support in Safe List.

700966

VNC icon should be disabled for built-in decoy images.

684100

Add a new Type level to incident alert.

691043

Out-of-bounds array indexing in system-install.

691044

Race condition vulnerability in command shell.

691052

Uncontrolled resource consumption (unauthenticated denial of service) in login module.

700707

Increase the default HDD size for FortiDeceptor VM model from 200GB to 500GB.

704731

Disable or set as readonly the deception menu on client appliances.

703937

Email does not work on the relay server that is restricted to verifying the host name in EHLO command.

701901

Decoy deploy stuck in starting status when decoy number reaches the limit and all the decoys try to launch.

702308

Decoy template can be saved many times.

672826

Improve performance of CLI data-purge command.

704681

Lure generator does not use the given user names.

706619

Lure generator does not use the user imported resource file.

684102

Default admin user cannot update the trusted host configuration.

675622

Verify confirmation-id to numeric characters only.

576167

dcimg-status should show uninitialized deception OS.

685536

System time change affects Windows variety decoy keepalive functionality.

523262

Static mode all IP addresses of gateway and IP range should be in the same subnet of selected monitor VLAN or subnet.

698087

Provide download button for the imported LDAP users.

659719

Verify that custom ports do not conflict with each other.

675241

Deception OS page shows empty list on bootup even after proper network configuration.

702318

When overwrite is not enabled, allow overwrite server address to be empty.

704023

CM Manager should show CM related info in secure Fabric widget.

681427

When deception OS does not have a license, the deployed decoy cannot be deleted.

681894

Command injection vulnerability caused by call function in subprocess.

683253

Software version tracking.

677286

Vulnerability for FortiDeceptor GUI.

707651

Import lure user from LDAP page needs to provide CA certificate dropdown list, not text field.

707304

Force refresh whole page or logout session when switching mode.

703864

Analysis-Export to PDF download failed / content overflow.

685336

Remote admin user auth test mixed with local trusthost verification.

706621

The hostname generated by automated lure process should be valid.

707285

RDP and SMB detection issues with Cus Win join AD.

707327

Ubuntu Samba service: the event operation type needs to be more specific.