Resolved issues
The following issues have been fixed in version 6.2.11. To inquire about a particular bug, please contact Customer Service & Support.
Explicit Proxy
Bug ID |
Description |
---|---|
765761 |
Firewall with forward proxy and UTM enabled is sending TLS probe with forward proxy IP instead of real server IP. |
Firewall
Bug ID |
Description |
---|---|
629529 |
Local-in policy session will not update after policy changes. |
738584 |
Firewall is using the wrong NAT IP address to send out traffic after removing the VIP and its associated policy. |
770668 |
The packet dropped counter is not incremented for |
GUI
Bug ID |
Description |
---|---|
746953 |
On the Network > Interfaces page, users cannot modify the TFTP server setting. A warning with the message This option may not function correctly. It is already configured using the CLI attribute: tftp-server. appears beside the DHCP Options entry. |
749451 |
On the Network > SD-WAN page, the volume sent/received displayed in the charts does not match the values provided from the REST API when the RX and TX values of |
HA
Bug ID |
Description |
---|---|
627968 |
Local-in policy with |
640327 |
Duplicate logs are created by both primary and secondary devices for IPsec VPN. |
779512 |
If the interface name is a number, an error occurs when that number is used as an |
Intrusion Prevention
Bug ID |
Description |
---|---|
682071 |
IPS signatures not working with VIP in proxy mode. |
698247 |
Flow mode web filter |
715360 |
Each time an AV database update occurs (scheduled or manually triggered), the IPS engine restarts on the SLBC secondary blade. |
755859 |
The IPS sessions count is higher than system sessions, which causes the FortiGate to enter conserve mode. |
775696 |
Each time an AV database update occurs (scheduled or manual), the IPS engine restarts on the SLBC secondary blade. This stops UTM analysis for sessions affected by that blade. |
IPsec VPN
Bug ID |
Description |
---|---|
715671 |
Traffic is failing on dialup VPN IKEv2 with EAP authentication. |
726326, 745331 |
IPsec server with NP offloading drops packets with an invalid SPI during rekey. |
Log & Report
Bug ID |
Description |
---|---|
764478 |
Logs are missing on FortiGate Cloud from the FortiGate. |
Proxy
Bug ID |
Description |
---|---|
603874 |
WAD may encounter memory corruption issue if the resources allocated by FTS are not cleaned up properly. |
692444 |
WAD memory leak is caused by missing a close event. The WAD receives a close event from TCP when the SSL port is blocked by the up application layer. If the SSL port input buffer does not have any data, then the close event will get ignored even if the application layer turns off blocking and the SSL port will leak. |
693441 |
WAD crashes at |
729237 |
WAD crash occurs that is related to virtual server traffic. |
Security Fabric
Bug ID |
Description |
---|---|
686420 |
Dynamic address resolution is lost when SDN connector sends |
690812 |
FortiGate firewall dynamic address resolution lost when SDN connector updates its cache. |
SSL VPN
Bug ID |
Description |
---|---|
677057 |
SSL VPN firewall policy creation via CLI does not require setting user identity. |
737894 |
If there are no users or groups in an SSL VPN policy, the SSL VPN daemon may crash when an FQDN is a destination address in the firewall policy. |
771162 |
Unable to access SSL VPN bookmark in web mode. |
Switch Controller
Bug ID |
Description |
---|---|
740661 |
FortiGate loses FortiSwitch management access due to excessive configuration pushes. |
System
Bug ID |
Description |
---|---|
627054 |
HTTPSD signal 6 crash in cases of long application lists that are greater or equal to the maximum size of 16. |
642958 |
FG-80E terminates the firewall session abruptly when the end-users download large files. |
651626 |
A session clash is caused by the same NAT port. It happens when many sessions are created at the same time and they get the same NAT port due to the wrong port seed value. |
662239 |
FGR-60F-3G4G hardware switch span does not work. |
671116 |
Lack of null pointer check in NP6XLite driver may lead to kernel panic. Affected models: FG-40F, FG-60F, and FG-101F. |
681322 |
TCP 8008 permitted by authd, even though the service in the policy does not include that port. |
682681 |
DSL line takes a long time to synchronize. |
703219, 708446 |
Kernel panic on FG-101F due to lack of null pointer check on NP6XLite driver. |
712321 |
Multiple ports flapping when a single interface is manually brought up. Affected platforms: FG-3810D and FG-3815D. |
749613 |
Unable to save configuration changes, and get |
749835 |
Traffic logs reports ICMP destination as unreachable for received traffic |
750171 |
Legitimate traffic is unable to go through with NP6 |
751523 |
When changing mode from DHCP to static, the existing DHCP IP is kept so no CLI command is generated and sent to FortiManager. |
754951 |
Static ARP entry was removed while using DHCP relay. |
763185 |
High CPU usage on platforms with low free memory upon IPS engine initialization. |
765452 |
On FG-100F, no event is raised for PSU failure and the diagnostic command is not available. |
778474 |
dhcpd is not processing discover messages if they contain a 0 length option, such as 80 (rapid commit). The warning, |
User & Device
Bug ID |
Description |
---|---|
604906 |
FortiOS does not prompt for token when using RADIUS and two-factor authentication to connect to IPsec IKEv2. |
757883 |
FortiGate blocks expired root CA, even if the cross-signed intermediate CA of the root CA is valid. |
VM
Bug ID |
Description |
---|---|
759300 |
gcpd has signal 11 crash at |
Web Filter
Bug ID |
Description |
---|---|
806920 |
Incomplete TCP handshake with NP offloading enabled on policies with wireless interfaces. |
WiFi Controller
Bug ID |
Description |
---|---|
720497 |
MAC authentication bypass is not working for some clients. |
Common Vulnerabilities and Exposures
Visit https://fortiguard.com/psirt for more information.
Bug ID |
CVE references |
---|---|
689909 |
FortiOS 6.2.11 is no longer vulnerable to the following CVE Reference:
|
695018 |
FortiOS 6.2.11 is no longer vulnerable to the following CVE Reference:
|
707951 |
FortiOS 6.2.11 is no longer vulnerable to the following CVE Reference:
|
744267 |
FortiOS 6.2.11 is no longer vulnerable to the following CVE References:
|
749471 |
FortiOS 6.2.11 is no longer vulnerable to the following CVE Reference:
|
763982 |
FortiOS 6.2.11 is no longer vulnerable to the following CVE Reference:
|
764221 |
FortiOS 6.2.11 is no longer vulnerable to the following CVE Reference:
|
765177 |
FortiOS 6.2.11 is no longer vulnerable to the following CVE Reference:
|
787111 |
FortiOS 6.2.11 is no longer vulnerable to the following CVE Reference:
|
792067 |
FortiOS 6.2.11 is no longer vulnerable to the following CVE Reference:
|
797229 |
FortiOS 6.2.11 is no longer vulnerable to the following CVE Reference:
|
800259 |
FortiOS 6.2.11 is no longer vulnerable to the following CVE Reference:
|