Fortinet white logo
Fortinet white logo

FortiOS Release Notes

Resolved issues

Resolved issues

The following issues have been fixed in version 7.0.15. To inquire about a particular bug, please contact Customer Service & Support.

Application Control

Bug ID

Description

952307

FG-400F sees increased packet loss when using an application list in the policy.

FortiGate 6000 and 7000 platforms

Bug ID

Description

949175

During FIM failover from FIM2 to FIM1, the NP7 PLE sticks on a cache invalidation, stopping traffic.

HA

Bug ID

Description

869557

Upgrading or re-uploading an image to the HA secondary node causes the OS to be un-certified.

1011674

Upgrading from 7.0.14 GA to 7.2.8 GA from an HA secondary node fails with BIOS security level 2. The new image is unrecognized as un-certified and aborts the upgrade process. The HA cluster is unaffected.

Hyperscale

Bug ID

Description

936747

Connections per second (CPS) performance of SIP sessions accepted by hyperscale firewall policies with EIM and EIF disabled that include overload with port block allocation (PBA) GCN IP pools is lower than expected.

949188

ICMP reply packets are dropped by FortiOS in a NAT64 hyperscale policy.

961684

When DoS policies are used and the system is under stress conditions, BGP might go down.

976972

New primary can get stuck on failover with HTTP CC sessions.

Intrusion Prevention

Bug ID

Description

968367

IPS engine high memory usage can cause FortiOS to go into conserve mode.

Limitations

Bug ID

Description

961992

The buffer and description queue limitation of Marvell switch ports causes a performance limitation.

Routing

Bug ID

Description

935370

SD-WAN performance SLA tcp-connect probes clash with user sessions.

Security Fabric

Bug ID

Description

887967

Fabric crashes when synchronizing objects with names longer than 64 characters.

988526

Address object changes from the CLI of the root FortiGate in Security Fabric are not synchronized with downstream devices.

SSL VPN

Bug ID

Description

821240

Erroneous memory allocation observed in SSLVPNVD caused by a rare error condition.

System

Bug ID

Description

828557

FortiGate as DHCP relay is not showing a DHCP decline in the debugs when there is an IP conflict in the network.

888941

Some sessions are still reported as offloaded when auto-asic-offload is disabled.

910829

Degraded traffic bandwidth for download passing from 10G to 1G interfaces.

937500, 969083

FortiOS does not accept an installation script from FortiManager when creating an extender-profile with login-password-change is set to yes.

938449

In the 4.19 kernel, when a neighbor's MAC is changed, the session and IPsec tunnel cannot be flushed from the NPU.

943090

Buffer and description queue limitation of Marvell switch port will cause a performance limitation.

949481

The tx_collision_err counter in the FortiOS CLI keeps increasing on both 10G SFP+ X1 and X2 interfaces.

956107

On the FortiGate 400F and 600F, the buffer and description queue limitation of the Marvell switch port causes a performance limitation.

984696

Network usage is not accurately reported by the get system performance status command.

986698

The NP7 should use the updated MAC address from the ARP table to forward traffic to the destination server.

1000884

SCM tools prevent users from logging into FortiGate using SSH after an upgrade.

1001498

On FortiGate, TCP and UDP traffic cannot pass through with dos-offload enabled.

1001938

Support Kazakhstan time zone change to a single time zone, UTC+5.

User & Authentication

Bug ID

Description

1000108

Guest-management administrators cannot see or print guest user passwords in plain text; the password is masked as ENC XXXX string.

WiFi Controller

Bug ID

Description

821320

FG-1800F drops wireless client traffic in L2 tunneled VLAN with capwap-offload enabled.

Common Vulnerabilities and Exposures

Visit https://fortiguard.com/psirt for more information.

Bug ID

CVE references

998718

FortiOS 7.0.15 is no longer vulnerable to the following CVE Reference:

  • CVE-2024-26010

Resolved issues

Resolved issues

The following issues have been fixed in version 7.0.15. To inquire about a particular bug, please contact Customer Service & Support.

Application Control

Bug ID

Description

952307

FG-400F sees increased packet loss when using an application list in the policy.

FortiGate 6000 and 7000 platforms

Bug ID

Description

949175

During FIM failover from FIM2 to FIM1, the NP7 PLE sticks on a cache invalidation, stopping traffic.

HA

Bug ID

Description

869557

Upgrading or re-uploading an image to the HA secondary node causes the OS to be un-certified.

1011674

Upgrading from 7.0.14 GA to 7.2.8 GA from an HA secondary node fails with BIOS security level 2. The new image is unrecognized as un-certified and aborts the upgrade process. The HA cluster is unaffected.

Hyperscale

Bug ID

Description

936747

Connections per second (CPS) performance of SIP sessions accepted by hyperscale firewall policies with EIM and EIF disabled that include overload with port block allocation (PBA) GCN IP pools is lower than expected.

949188

ICMP reply packets are dropped by FortiOS in a NAT64 hyperscale policy.

961684

When DoS policies are used and the system is under stress conditions, BGP might go down.

976972

New primary can get stuck on failover with HTTP CC sessions.

Intrusion Prevention

Bug ID

Description

968367

IPS engine high memory usage can cause FortiOS to go into conserve mode.

Limitations

Bug ID

Description

961992

The buffer and description queue limitation of Marvell switch ports causes a performance limitation.

Routing

Bug ID

Description

935370

SD-WAN performance SLA tcp-connect probes clash with user sessions.

Security Fabric

Bug ID

Description

887967

Fabric crashes when synchronizing objects with names longer than 64 characters.

988526

Address object changes from the CLI of the root FortiGate in Security Fabric are not synchronized with downstream devices.

SSL VPN

Bug ID

Description

821240

Erroneous memory allocation observed in SSLVPNVD caused by a rare error condition.

System

Bug ID

Description

828557

FortiGate as DHCP relay is not showing a DHCP decline in the debugs when there is an IP conflict in the network.

888941

Some sessions are still reported as offloaded when auto-asic-offload is disabled.

910829

Degraded traffic bandwidth for download passing from 10G to 1G interfaces.

937500, 969083

FortiOS does not accept an installation script from FortiManager when creating an extender-profile with login-password-change is set to yes.

938449

In the 4.19 kernel, when a neighbor's MAC is changed, the session and IPsec tunnel cannot be flushed from the NPU.

943090

Buffer and description queue limitation of Marvell switch port will cause a performance limitation.

949481

The tx_collision_err counter in the FortiOS CLI keeps increasing on both 10G SFP+ X1 and X2 interfaces.

956107

On the FortiGate 400F and 600F, the buffer and description queue limitation of the Marvell switch port causes a performance limitation.

984696

Network usage is not accurately reported by the get system performance status command.

986698

The NP7 should use the updated MAC address from the ARP table to forward traffic to the destination server.

1000884

SCM tools prevent users from logging into FortiGate using SSH after an upgrade.

1001498

On FortiGate, TCP and UDP traffic cannot pass through with dos-offload enabled.

1001938

Support Kazakhstan time zone change to a single time zone, UTC+5.

User & Authentication

Bug ID

Description

1000108

Guest-management administrators cannot see or print guest user passwords in plain text; the password is masked as ENC XXXX string.

WiFi Controller

Bug ID

Description

821320

FG-1800F drops wireless client traffic in L2 tunneled VLAN with capwap-offload enabled.

Common Vulnerabilities and Exposures

Visit https://fortiguard.com/psirt for more information.

Bug ID

CVE references

998718

FortiOS 7.0.15 is no longer vulnerable to the following CVE Reference:

  • CVE-2024-26010