Fortinet white logo
Fortinet white logo

Resolved issues

Resolved issues

The following issues have been fixed in version 4.2.0. For inquires about a particular bug, please contact Customer Service & Support.

Bug ID

Description

778027

NFR: Support the HyperV virtual platform for FDC VM model.

771791

NFR: Support New Deception Token Module.

778998

NFR: Prepare new deception OS base image Ubuntu16v2.

771786

NFR: Support FTP service on Linux and Windows decoys.

771793

NFR: FortiSIEM Watch-List Integration and Alerts Reporting.

771800

NFR: Fabric Integration with CrowdStrike isolation.

771806

NFR: Support Attacker IP-DNS Resolving.

771812

NFR: Support ARP Poisoning attacks detection.

771796

NFR: Fabric Integration with Cuckoo Malware Sandbox.

771805

NFR: Support STIX/TAXII / MISP TI Connector.

759738

NFR: Support 2 DNS IP in decoy.

763249

NFR: Provide GUI page to input the activation ID instead of dcvm-confirm-id CLI.

774445

NFR: Implement HTTP/HTTPS proxy support for web filter.

771776

NFR: Asset Discovery stage 1 - Passive OS fingerprint.

771779

NFR: Support ESXi Decoy.

771785

NFR: Support medical BBraun Infusomat Space Decoy.

771789

NFR: Support Elasticsearch service decoy.

771803

NFR: Fabric Integration with MS ATP Manager.

773486

NFR: Improve the PDF report with similar structure as FAZ deception incidents report.

722102

NFR: Inspect the related traffic only for incident to save HDD when there is a high volume traffic.

759090

NFR: Support automated un-installation process into Token installation for domain ENV.

795293

NFR: Support for creating Incident reports.

682479

NFR: Support 2 FA authentication for radius.

789797

CSS: Custom SMB share folders to different groups in Custom Windows Image should not be ignored.

771675

CSS: The email alert attached to all the events information in HTML format as attachments which should be in email body.

777413

CSS: Issues with PAN Integration.

798135

FortiDeceptor - FortiSandbox / FortiDeceptor - No profile-based access control over APIs.

775218

Install ubuntu token failed for permission denied.

803008

Cloud client: Login page crashed in brand new Azure clients.

785637

Cloud client: Login page crashed in brand new GCP clients.

794879

Administrative access should only be enabled on Port1.

771670

Only the HDD file system error should be reported.

773478

Email rules should allow user to choose multiple severity levels.

797106

Display license expiry date in license page.

777864

Outgoing traffic from windows decoys.

777923

Improve time stamp convert function to reduce time.

788930

Email alert customer issues.

779644

HTTP OPTIONS requests are being made to network shares and are being logged as medium risk incidents.

779634

Decoy status page: Hide the password for domain in Network section.

800480

TP LINK router: TP LINK Web Postman access failed.

779642

Support upper case for SMB share name for windows decoys.

777528

Custom Windows 2019: Missing SMB events.

Common Vulnerabilities and Exposures

Visit https://fortiguard.com/psirt for more information.

Bug ID

CVE references

798135

FortiDeceptor 4.2.0 is no longer vulnerable to the following CVE:

  • CVE-2022-27487

Resolved issues

Resolved issues

The following issues have been fixed in version 4.2.0. For inquires about a particular bug, please contact Customer Service & Support.

Bug ID

Description

778027

NFR: Support the HyperV virtual platform for FDC VM model.

771791

NFR: Support New Deception Token Module.

778998

NFR: Prepare new deception OS base image Ubuntu16v2.

771786

NFR: Support FTP service on Linux and Windows decoys.

771793

NFR: FortiSIEM Watch-List Integration and Alerts Reporting.

771800

NFR: Fabric Integration with CrowdStrike isolation.

771806

NFR: Support Attacker IP-DNS Resolving.

771812

NFR: Support ARP Poisoning attacks detection.

771796

NFR: Fabric Integration with Cuckoo Malware Sandbox.

771805

NFR: Support STIX/TAXII / MISP TI Connector.

759738

NFR: Support 2 DNS IP in decoy.

763249

NFR: Provide GUI page to input the activation ID instead of dcvm-confirm-id CLI.

774445

NFR: Implement HTTP/HTTPS proxy support for web filter.

771776

NFR: Asset Discovery stage 1 - Passive OS fingerprint.

771779

NFR: Support ESXi Decoy.

771785

NFR: Support medical BBraun Infusomat Space Decoy.

771789

NFR: Support Elasticsearch service decoy.

771803

NFR: Fabric Integration with MS ATP Manager.

773486

NFR: Improve the PDF report with similar structure as FAZ deception incidents report.

722102

NFR: Inspect the related traffic only for incident to save HDD when there is a high volume traffic.

759090

NFR: Support automated un-installation process into Token installation for domain ENV.

795293

NFR: Support for creating Incident reports.

682479

NFR: Support 2 FA authentication for radius.

789797

CSS: Custom SMB share folders to different groups in Custom Windows Image should not be ignored.

771675

CSS: The email alert attached to all the events information in HTML format as attachments which should be in email body.

777413

CSS: Issues with PAN Integration.

798135

FortiDeceptor - FortiSandbox / FortiDeceptor - No profile-based access control over APIs.

775218

Install ubuntu token failed for permission denied.

803008

Cloud client: Login page crashed in brand new Azure clients.

785637

Cloud client: Login page crashed in brand new GCP clients.

794879

Administrative access should only be enabled on Port1.

771670

Only the HDD file system error should be reported.

773478

Email rules should allow user to choose multiple severity levels.

797106

Display license expiry date in license page.

777864

Outgoing traffic from windows decoys.

777923

Improve time stamp convert function to reduce time.

788930

Email alert customer issues.

779644

HTTP OPTIONS requests are being made to network shares and are being logged as medium risk incidents.

779634

Decoy status page: Hide the password for domain in Network section.

800480

TP LINK router: TP LINK Web Postman access failed.

779642

Support upper case for SMB share name for windows decoys.

777528

Custom Windows 2019: Missing SMB events.

Common Vulnerabilities and Exposures

Visit https://fortiguard.com/psirt for more information.

Bug ID

CVE references

798135

FortiDeceptor 4.2.0 is no longer vulnerable to the following CVE:

  • CVE-2022-27487