Fortinet white logo
Fortinet white logo

Resolved issues

Resolved issues

The following issues have been fixed in version 6.0.0. For inquires about a particular bug, please contact Customer Service & Support.

Bug ID

Description

968262

Support firmware upgrade for clients on DaaS web GUI.

973951

Support utilized session management for HTTP/HTTPS servers and Web APP proxy on all Linux based decoys.

976829

Report hash md5 and sha256 for dumped files in syslog.

981976

Uploading a license name with parenthesis () returns an invalid request.

986593

Support SSH mitigation for Linux endpoint.

990365

FortiDeceptor sometimes only syncs the detected attacker IP to part of the integrated FortiGates.

990568

Windows decoy: No events/incidents are reported when and attacker uses psexec to upload and execute malware exe file.

996260

FortiDeceptor cannot send emails if the mail server and deployment network are in the same VLAN.

996920

Cannot configure LDAP password when it contains an equals (=) sign.

1001097

Custom Windows decoy with IIS not accepting certificates.

1001169

Auto VLAN discovery does not work.

1004351

FDCVME models require a new OVF config file.

1015070

Allow users to specify the HDD size when customizing decoy OS.

1023691

Alert mail: Disable Binary Infection by default.

1023723

Support for report MSSQL events generated by accessing locally.

1028407

Support complex usernames extracted from LDAP import.

1032133

Fabric CheckPoint can only install policy package named Standard.

1035895

Remove HTTP/TELNET support from admin interface for all models

1038557

Support diagnose ping/tcpdump command in deployment network

1045747

Decoy created from a saved template causes password errors unless lures are regenerated.

1051515

Update the OVF configuration zip structure or both FDCVMS and FDCVME

1053053

Deployment network is not able to deploy monitors for the cloud client.

1053290

Convert supported certificate format to PEM

FortiDeceptor Cloud

Common vulnerabilities and exposures

985985

FortiDeceptor 6.0.0 is no longer vulnerable to the following CVE:

  • CVE-2023-48795

Resolved issues

Resolved issues

The following issues have been fixed in version 6.0.0. For inquires about a particular bug, please contact Customer Service & Support.

Bug ID

Description

968262

Support firmware upgrade for clients on DaaS web GUI.

973951

Support utilized session management for HTTP/HTTPS servers and Web APP proxy on all Linux based decoys.

976829

Report hash md5 and sha256 for dumped files in syslog.

981976

Uploading a license name with parenthesis () returns an invalid request.

986593

Support SSH mitigation for Linux endpoint.

990365

FortiDeceptor sometimes only syncs the detected attacker IP to part of the integrated FortiGates.

990568

Windows decoy: No events/incidents are reported when and attacker uses psexec to upload and execute malware exe file.

996260

FortiDeceptor cannot send emails if the mail server and deployment network are in the same VLAN.

996920

Cannot configure LDAP password when it contains an equals (=) sign.

1001097

Custom Windows decoy with IIS not accepting certificates.

1001169

Auto VLAN discovery does not work.

1004351

FDCVME models require a new OVF config file.

1015070

Allow users to specify the HDD size when customizing decoy OS.

1023691

Alert mail: Disable Binary Infection by default.

1023723

Support for report MSSQL events generated by accessing locally.

1028407

Support complex usernames extracted from LDAP import.

1032133

Fabric CheckPoint can only install policy package named Standard.

1035895

Remove HTTP/TELNET support from admin interface for all models

1038557

Support diagnose ping/tcpdump command in deployment network

1045747

Decoy created from a saved template causes password errors unless lures are regenerated.

1051515

Update the OVF configuration zip structure or both FDCVMS and FDCVME

1053053

Deployment network is not able to deploy monitors for the cloud client.

1053290

Convert supported certificate format to PEM

FortiDeceptor Cloud

Common vulnerabilities and exposures

985985

FortiDeceptor 6.0.0 is no longer vulnerable to the following CVE:

  • CVE-2023-48795