Resolved issues
The following issues have been fixed in version 6.4.13. To inquire about a particular bug, please contact Customer Service & Support.
Explicit Proxy
Bug ID |
Description |
---|---|
794124 |
HTTPS websites are not accessible if |
849794 |
Random websites are not accessible after upgrading when using a proxy policy. |
Firewall
Bug ID |
Description |
---|---|
727809 |
Disabled deny firewall policy with virtual server objects cannot be enabled after a firewall reboot. |
739949 |
In HA virtual cluster scenario, the Bytes counter on the Firewall Policy page always shows 0 B for the secondary while the Edit Policy page shows the correct Total bytes in the statistics. |
808264 |
Stress test shows packet loss when testing with flow inspection mode and application control. |
856187 |
Explicit FTPS stops working with IP pool after upgrading from 6.4.8 to 6.4.9. |
865661 |
Standard and full ISDB sizes are not configurable on FG-101F. |
GUI
Bug ID |
Description |
---|---|
722358 |
When a FortiGate local administrator is assigned to more than two VDOMs and tries logging in to the GUI console, they get a command parse error when entering VDOM configuration mode. |
748530 |
A gateway of 0.0.0.0 is not accepted in a policy route. |
870675 |
CLI console in GUI reports Connection lost. when the administrator has more than 100 VDOMs assigned. Workaround: use SSH directly or reduce the number of VDOMs. |
HA
Bug ID |
Description |
---|---|
776355 |
Packet loss occurs on the software switch interface when a passive device goes down. |
816883 |
High CPU usage on secondary device, and CPU lacks the AVX feature needed to load |
830879 |
Running |
832634 |
HA failovers occur due to the kernel hanging on FG-100F. |
853900 |
The administrator |
856643 |
FG-500E interface stops sending IPv6 RAs after upgrading. |
874823 |
FGSP |
906036 |
Secondary blade hostname and mgmt1 IP were changed after a restored configuration on the primary blade. |
Intrusion Prevention
Bug ID |
Description |
---|---|
715360 |
Each time an AV database update occurs (scheduled or manually triggered), the IPS engine restarts on the SLBC secondary blade. |
775696 |
Each time an AV database update occurs (scheduled or manual), the IPS engine restarts on the SLBC secondary blade. This stops UTM analysis for sessions affected by that blade. |
810783 |
The number of IPS sessions is higher than kernel sessions, which causes the FortiGate to enter conserve mode. |
839170 |
Improvements to IPS engine monitor to resolve an error condition during periods of heavy traffic loads. |
IPsec VPN
Bug ID |
Description |
---|---|
765174, 775279 |
Certain packets are causing IPsec tunnel drops on NP6XLite platforms after HA failover because the packet is not checked properly. |
788751 |
IPsec VPN Interface shows incorrect TX/RX counter. |
805301 |
Enabling NPU offloading in the phase 1 settings causes a complete traffic outage after a couple of ping packets pass through. |
822651 |
NP dropping packet in the incoming direction for SoC4 models. |
840153 |
Unexpected dynamic selectors block traffic when |
842528 |
Improper IKEv1 quick mode fragmentation from third-party client can cause an IKE crash. |
877161 |
IPsec traffic failing from FortiGate with |
892699 |
In an HA cluster, static routes via the IPsec tunnel interface are not inactive in the routing table when the tunnel is down. |
Log & Report
Bug ID |
Description |
---|---|
823183 |
FortiGates are showing Logs Queued in the GUI after a FortiAnalyzer reboot, even tough the queued logs were actually all uploaded to FortiAnalyzer and cleared when the connection restores. |
873987 |
High memory usage from miglogd processes even without traffic. |
874026 |
Caching a large number of service port entries causes high log daemon memory usage. |
Proxy
Bug ID |
Description |
---|---|
867614 |
Multiple and recurrent WAD crashes are causing platform instability and conserve mode after upgrading to 6.4.11 because the Unix stream might be null in some scenarios. |
REST API
Bug ID |
Description |
---|---|
745926 |
Using multiple logical AND symbols (&) on monitor API filtering causes a 502 Bad Gateway error. |
Routing
Bug ID |
Description |
---|---|
618684 |
When HA failover is performed to the other cluster member that is not able to reach the BFD neighbor, the BFD session is down as expected but the static route is present in the routing table. |
769100 |
Policy routes order is changed after updating the source/destination of SD-WAN rules. |
797590 |
GRE tunnel configured using a loopback interface is not working after changing the interface back and forth. |
846107 |
IPv6 VRRP backup is sending RA, which causes routing issues. |
860075 |
Traffic session is processed by a different SD-WAN rule and randomly times out. |
862418 |
Application VWL crash occurs after FortiManager configuration push causes an SD-WAN related outage. |
864626 |
FortiGate local traffic does not follow SD-WAN rules. |
890379 |
After upgrading, SD-WAN is unable to fail over the traffic when one interface is down. |
Security Fabric
Bug ID |
Description |
---|---|
885810 |
The gcpd daemon constantly crashes (signal 11 segmentation fault). |
SSL VPN
Bug ID |
Description |
---|---|
781581 |
Customer internal website is not shown correctly in SSL VPN web mode. |
803576 |
Comments in front of |
803622 |
High CPU in SSL VPN once SAML is used with FortiAuthenticator and an LDAP server. |
818196 |
SSL VPN does not work properly after reconnecting without authentication and a TX drop is found. |
873995 |
Problem with the internal website using SSL VPN web mode. |
850898 |
OS checklist for the SSL VPN in FortiOS does not include macOS Ventura (13). |
884860 |
SSL VPN tunnel mode gets disconnected when SSL VPN web mode is disconnected by |
Switch Controller
Bug ID |
Description |
---|---|
798724 |
FortiSwitch exported ports in tenant VDOM are gone after rebooting the FortiGate. |
System
Bug ID |
Description |
---|---|
688009 |
Update built-in modem firmware that comes with the device in order for the SIM to be correctly identified and make LTE link work properly. |
709679 |
Get |
721119 |
The forticron process uses high CPU. |
729912 |
DNS proxy does not transfer the DNS query for IPv6 neighbor discovery (ND) when client devices are using random MAC addresses, so one device can configure many IPv6 addresses. |
753421 |
Slow SNMP query performance of fgVpn2Tables OIDs when a large number of IPsec dialup tunnels are connected. |
754681 |
The auto-script is not restarted when it is changed from HA synchronization. |
766834 |
High memory usage caused by downloading a large CRL list. |
782962 |
PSU alarm log and SNMP trap are added for FG-10xF and FG-8xF models. |
790656 |
DNS fails to correctly resolve hosts using the DNS database. |
796094 |
Egress traffic on EMAC VLAN is using base MAC address instead. |
800295 |
NTP server has intermittent unresolvable logs after upgrading to 6.4. |
815937 |
FCLF8522P2BTLFTN transceiver is not working after upgrade. |
828070 |
CLI displays |
840960 |
When kernel debug level is set to |
844937 |
FG-3700D unexpectedly reboots after the COMLog reported a kernel panic due to an IPv6 failure to set up the master session for the expectation session under some conditions. |
850430 |
DHCP relay does not work properly with two DHCP relay servers configured. |
850683 |
Console keeps displaying |
850688 |
FG-20xF system halts if setting |
855151 |
There may be a race condition between the CMDB initializing and the customer language file loading, which causes the customer language file to be removed after upgrading. |
859795 |
High CPU utilization occurs when relay is enabled on VLAN, and this prevents users from getting an IP from DHCP. |
868002 |
FortiGate is unable to resolve DNS from the DNS database for local out traffic (ICMP and access to RADIUS server). |
Upgrade
Bug ID |
Description |
---|---|
743389 |
The |
User & Authentication
Bug ID |
Description |
---|---|
679016, 749694 |
A fnbamd crash is caused when the LDAP server is unreachable. |
688065 |
When using the |
839801 |
FortiToken purge in a VDOM clears all FortiToken statuses in the system. |
851233 |
FortiToken activation emails should include HTTPS links to documentation instead of HTTP. |
VM
Bug ID |
Description |
---|---|
785929 |
AWS FortiGate fails to bootstrap in new region of Cape Town, South Africa (af-south-1). |
VoIP
Bug ID |
Description |
---|---|
757477 |
PRACK will cause voipd crashes when the following conditions are met: |
Common Vulnerabilities and Exposures
Visit https://fortiguard.com/psirt for more information.
Bug ID |
CVE references |
---|---|
843324 |
FortiOS 6.4.13 is no longer vulnerable to the following CVE Reference:
|
854171 |
FortiOS 6.4.13 is no longer vulnerable to the following CVE Reference:
|
858793 |
FortiOS 6.4.13 is no longer vulnerable to the following CVE Reference:
|
887734 |
FortiOS 6.4.13 is no longer vulnerable to the following CVE Reference:
|
894168 |
FortiOS 6.4.13 is no longer vulnerable to the following CVE Reference:
|
896403 |
IPS Engine 6.00160 is no longer vulnerable to the following CVE Reference:
|
898402 |
FortiOS 6.4.13 is no longer vulnerable to the following CVE Reference:
|
918991 |
FortiOS 6.4.13 is no longer vulnerable to the following CVE Reference:
|