Fortinet black logo

Resolved issues

Resolved issues

The following issues have been fixed in version 7.2.3. To inquire about a particular bug, please contact Customer Service & Support.

Anti Virus

Bug ID

Description

794575

If FortiGate Cloud is selected as sandbox server under Security Fabric > Fabric Connectors, an anti virus profile with settings to Send files to FortiSandbox for inspection does not get saved in the GUI.

Application Control

Bug ID

Description

849310

If the Vimeo_Video.Play signature is set to monitor, the log is missing the filename field and video name.

Explicit Proxy

Bug ID

Description

803228

When converting an explicit proxy session to SSL redirect, traffic may be interrupted inadvertently in some situations.

GUI

Bug ID

Description

829313

The dropdown field for the IdP Certificate is empty when editing an SSO user configuration (User & Authentication > Single Sign-On), even though the summary shows an IdP certificate.

835089

Unable to move SD-WAN rule ordering in the GUI (FortiOS 7.2.1).

HA

Bug ID

Description

823687

A cluster is repeatedly out-of sync due to external files (SSLVPN_AUTH_GROUPS) when there are frequent user logins and logouts.

IPsec VPN

Bug ID

Description

765868

The packets did not pass through QTM, and SYN packets bypass the IPsec tunnel once traffic is offloaded. Affected platforms: NP7 models.

Log & Report

Bug ID

Description

789007

Unable to select FortiAnalyzer as a data source on the Summary tab for the System Events and Security Events pages.

826431

FortiGate Cloud log viewer shows no results for the 5 minutes and 1 hour time period due to an incorrect timestamp (24 hours is OK).

Proxy

Bug ID

Description

780182

WAD crash occurred when forwarding the release bytes from the IPS engine to the server and the connection to the server is closed.

825496

Explicit proxy traffic is terminated when IPS is enabled. The exact failure happened upon certificate inspection.

836198

Console randomly displays a read_tagbuf - 152: Failed to open device: /dev/sdb errno:2(No such file or directory) error.

Routing

Bug ID

Description

822659

Secure SD-WAN Monitor in FortiAnalyzer does not show graphs when the SLA target is not configured in SD-WAN performance SLA.

SSL VPN

Bug ID

Description

848437

The sslvpn process crashes if a POST request with a body greater than 2 GB is received.

856316

Browser displays an Error, Feature is not available message if a file larger than 1 MB is uploaded from FTP or SMB using a web bookmark, even though the file is uploaded successfully. There are no issues with downloading files.

System

Bug ID

Description

784169

When a virtual switch member port is set to be an alternate by STP, it should not reply with ARP; otherwise, the connected device will learn the MAC address from the alternate port and send subsequent packets to the alternate port.

810879

DoS policy ID cannot be moved in GUI and CLI when enabling multiple DoS policies.

855151

There may be a race condition between the CMDB initializing and the customer language file loading, which causes the customer language file to be removed after upgrading.

User & Authentication

Bug ID

Description

822923

When a device is detected as vulnerable, its source is not set and the inventory query quits.

827458

A User device store query error (error code: -1) warning appears on the Asset Identity Center page.

WiFi Controller

Bug ID

Description

821803

Wireless multicast traffic causes the cw_acd process to have high CPU usage and triggers a hostapd crash.

Common Vulnerabilities and Exposures

Visit https://fortiguard.com/psirt for more information.

Bug ID

CVE references

843324

FortiOS 7.2.3 is no longer vulnerable to the following CVE Reference:

  • CVE-2022-42472

850842

FortiOS 7.2.3 is no longer vulnerable to the following CVE Reference:

  • CVE-2022-41335

853448

FortiOS 7.2.3 is no longer vulnerable to the following CVE Reference:

  • CVE-2022-42475

855446

FortiOS 7.2.3 is no longer vulnerable to the following CVE References:

  • CVE-2022-3602
  • CVE-2022-3786

Resolved issues

The following issues have been fixed in version 7.2.3. To inquire about a particular bug, please contact Customer Service & Support.

Anti Virus

Bug ID

Description

794575

If FortiGate Cloud is selected as sandbox server under Security Fabric > Fabric Connectors, an anti virus profile with settings to Send files to FortiSandbox for inspection does not get saved in the GUI.

Application Control

Bug ID

Description

849310

If the Vimeo_Video.Play signature is set to monitor, the log is missing the filename field and video name.

Explicit Proxy

Bug ID

Description

803228

When converting an explicit proxy session to SSL redirect, traffic may be interrupted inadvertently in some situations.

GUI

Bug ID

Description

829313

The dropdown field for the IdP Certificate is empty when editing an SSO user configuration (User & Authentication > Single Sign-On), even though the summary shows an IdP certificate.

835089

Unable to move SD-WAN rule ordering in the GUI (FortiOS 7.2.1).

HA

Bug ID

Description

823687

A cluster is repeatedly out-of sync due to external files (SSLVPN_AUTH_GROUPS) when there are frequent user logins and logouts.

IPsec VPN

Bug ID

Description

765868

The packets did not pass through QTM, and SYN packets bypass the IPsec tunnel once traffic is offloaded. Affected platforms: NP7 models.

Log & Report

Bug ID

Description

789007

Unable to select FortiAnalyzer as a data source on the Summary tab for the System Events and Security Events pages.

826431

FortiGate Cloud log viewer shows no results for the 5 minutes and 1 hour time period due to an incorrect timestamp (24 hours is OK).

Proxy

Bug ID

Description

780182

WAD crash occurred when forwarding the release bytes from the IPS engine to the server and the connection to the server is closed.

825496

Explicit proxy traffic is terminated when IPS is enabled. The exact failure happened upon certificate inspection.

836198

Console randomly displays a read_tagbuf - 152: Failed to open device: /dev/sdb errno:2(No such file or directory) error.

Routing

Bug ID

Description

822659

Secure SD-WAN Monitor in FortiAnalyzer does not show graphs when the SLA target is not configured in SD-WAN performance SLA.

SSL VPN

Bug ID

Description

848437

The sslvpn process crashes if a POST request with a body greater than 2 GB is received.

856316

Browser displays an Error, Feature is not available message if a file larger than 1 MB is uploaded from FTP or SMB using a web bookmark, even though the file is uploaded successfully. There are no issues with downloading files.

System

Bug ID

Description

784169

When a virtual switch member port is set to be an alternate by STP, it should not reply with ARP; otherwise, the connected device will learn the MAC address from the alternate port and send subsequent packets to the alternate port.

810879

DoS policy ID cannot be moved in GUI and CLI when enabling multiple DoS policies.

855151

There may be a race condition between the CMDB initializing and the customer language file loading, which causes the customer language file to be removed after upgrading.

User & Authentication

Bug ID

Description

822923

When a device is detected as vulnerable, its source is not set and the inventory query quits.

827458

A User device store query error (error code: -1) warning appears on the Asset Identity Center page.

WiFi Controller

Bug ID

Description

821803

Wireless multicast traffic causes the cw_acd process to have high CPU usage and triggers a hostapd crash.

Common Vulnerabilities and Exposures

Visit https://fortiguard.com/psirt for more information.

Bug ID

CVE references

843324

FortiOS 7.2.3 is no longer vulnerable to the following CVE Reference:

  • CVE-2022-42472

850842

FortiOS 7.2.3 is no longer vulnerable to the following CVE Reference:

  • CVE-2022-41335

853448

FortiOS 7.2.3 is no longer vulnerable to the following CVE Reference:

  • CVE-2022-42475

855446

FortiOS 7.2.3 is no longer vulnerable to the following CVE References:

  • CVE-2022-3602
  • CVE-2022-3786