Fortinet white logo
Fortinet white logo

Resolved issues

Resolved issues

The following issues have been fixed in version 7.2.5. To inquire about a particular bug, please contact Customer Service & Support.

Anti Spam

Bug ID

Description

857911

The Anti-Spam Block/Allow List Entry dialog page is not showing the proper Type values in the dropdown.

877613

Mark as Reject can be still chosen as an Action in an Anti-Spam Block/Allow List in the GUI.

Anti Virus

Bug ID

Description

818092

CDR archived files are deleted at random times and not retained.

849020

FortiGate may enter conserve mode while performing Content Disarm and Reconstruction (CDR) parsing on certain MS Office documents with a .tmp extension.

851706

Nothing is displayed in the Advanced Threat Protection Statistics dashboard widget.

863461

Scanunit displays unclear warnings when AV package validation fails.

869398

FortiGate sends too many unnecessary requests to FortiSandbox and causes high resource usage.

895950

Critical log message, Fortigate mmdb signature is missing, is generated on a unit without an AVDB contract.

Application Control

Bug ID

Description

857632

Unable to access to some websites when application control with deep inspection is enabled.

DNS Filter

Bug ID

Description

871854

DNS UTM log still presents unknown FortiGuard category even when the DNS proxy received a rating value.

878674

Forward traffic log is generated for allowed DNS traffic if the DNS filter is enabled but the policy is set to log security events only.

Explicit Proxy

Bug ID

Description

842016

Client gets 304 response if a cached object has varying headers and is expired.

849794

Random websites are not accessible with proxy policy after upgrading to 6.4.10.

865135

Multipart boundary parsing failed with CRLF before the end of boundary 1.

875736

The proxy-re-authentication-mode option has been removed in 7.2.4 and is replaced with proxy-keep-alive-mode re-authentication. The new proxy-re-authentication-time timer is associated with this re-authentication mode. There are two unresolved issues:

  • After upgrading, the previously configured proxy-auth-timeout value for the absolute re-authentication mode is not preserved in the new proxy-re-authentication-time.
  • The new proxy-re-authentication-time is currently configured in seconds, but it should be configured in minutes to be consistent with other related authentication timers (such as proxy-auth-timeout).

880361

Transparent web proxy policy has no match if the source or destination interface is the same and member of SD-WAN.

901239

Unexpected behavior in WAD caused by deploying virtual servers in non-server pool mode.

901614

Firewall schedule does not work as expected with a proxy policy.

Firewall

Bug ID

Description

719311

On the Policy & Objects > Firewall Policy page in 6.4.0 onwards, the IPv4 and IPv6 policy tables are combined but the custom section name (global label) is not automatically checked for duplicates. If there is a duplicate custom section name, the policy list may show empty for that section. This is a display issue only and does not impact policy traffic.

770541

Within the Policy & Objects menu, the firewall, DoS, and traffic shaping policy pages take around five seconds to load when the FortiGate cannot reach the FortiGuard DNS servers.

804603

An httpsd signal 6 crash occurs due to /api/v2/monitor/license/forticare-resllers.

816493

The set sub-type ems-tag option is blocked in HA diff installation.

835413

Inaccurate sFlow interface data reported to PRTG after upgrading to 7.0.

840689

Virtual server aborts connection when ssl-max-version is set to tls-1.3.

848058

NPD failed to parse zone in the source interface of a DoS/ACL policy and failed to offload.

851212

After traffic flow changes to FGSP peer from owner, iprope information for synchronized sessions does not update on the peer side.

854901

Full cone NAT (permit-any-host enable) causes TCP session clash.

856187

Explicit FTPS stops working with IP pool after upgrading.

860480

FG-3000D cluster kernel panic occurs when upgrading from 7.0.5 to 7.0.6 and later.

861981

Traffic drops between two back-to-back EMAC VLAN interfaces.

861990

Increased CPU usage in softirq after upgrading from 7.0.5 to 7.0.6.

864612

When the service protocol is an IP with no specific port, it is skipped to be cached and causes a protocol/port service name in the log.

865661

Standard and full ISDB sizes are not configurable on FG-101F.

872744

Packets are not matching the existing session in transparent mode.

875565

The policy or other cache lists are sometimes not freed in time. This may cause unexpected policies to be stored in the cache list.

884578

Unexpected behavior in WAD caused by enabling HTTP/2 while using virtual servers.

895962

Intermittent behavior in WAD during SSL renegotiation while using virtual servers.

897849

Firewall Policy list may show empty sequence grouping sections if multiple policies are sharing the same global-label.

912740

On a FortiGate managed by FortiManager, after upgrading to 7.4.0, the Firewall Policy list may show separate sequence grouping for each policy because the global-label is updated to be unique for each policy.

FortiGate 6000 and 7000 platforms

Bug ID

Description

838036

Merge FortiGate 6000 and 7000 series platforms.

888873

The FortiGate 7000E and 7000F platforms do not support GTP and PFCP load balancing.

902545

Unable to select a management interface LAG to be the direct SLBC logging interface.

905692

On a FortiGate 6000 or 7000, the active worker count returned by the output of diagnose sys ha dump-by group can be incorrect after an FPC or FPM goes down.

905788

Unable to select a management interface LAG to be the FGSP session synchronization interface.

FortiView

Bug ID

Description

838652

The FortiView Sessions monitor displays VDOM sessions from other VDOMs.

892798

Memory and CPU usage issues caused by malformed method header while using virtual servers.

GUI

Bug ID

Description

440197

On the System > FortiGuard page, the override FortiGuard server for AntiVirus & IPS Updates shows an Unknown status, even if the server is working correctly. This is a display issue only; the override feature is working properly.

677806

On the Network > Interfaces page when VDOM mode is enabled, the Global view incorrectly shows the status of IPsec tunnel interfaces from non-management VDOMs as up. The VDOM view shows the correct status.

699508

When an administrator ends a session by closing the browser, the administrator timeout event is not logged until the next time the administrator logs in.

722358

When a FortiGate local administrator is assigned to more than two VDOMs and tries logging in to the GUI console, they get a command parse error when entering VDOM configuration mode.

753328

Incorrect shortcut name shown on the Network > SD-WAN > Performance SLAs page.

807197

High iowait CPU usage and memory consumption issues caused by report runner.

820909

On the Policy & Objects > Schedules page, when the end date of a one-time schedule is set to the 31st of a month, it gets reset to the 1st of the same month.

Workaround: use CLI to set schedules with an end date of 31st.

821030

Security Fabric root FortiGate is unable to resolve firewall object conflicts in the GUI.

821734

Log & Report > Forward Traffic logs do not show the Policy ID if there is no Policy Name.

822991

On the Log & Report > Forward Traffic page, using the filter Result : Deny(all) does not work as expected.

827893

Security rating test for FortiCare Support fails when connected to FortiManager Cloud or FortiAnalyzer Cloud.

829736

Incorrect information is being displayed for the HA role on the System > HA page.

829773

Unable to load the Network > SD-WAN > SD-WAN Rules table sometimes due to a JavaScript error.

831439

On the WiFi & Switch Controller > SSIDs page, multiple DHCP servers for the same range can be configured on an interface if the interface name contains a comma (,) character.

837048

Unable to delete the LAN interface's addresses without switching it back to a none-LAN role.

842079

On the System > HA page, a Failed to retrieve info caution message appears when hovering over the secondary unit's Hostname. The same issue is observed on the Dashboard > Status > Security Fabric widget.

845513

On G-model profiles, changing the platform mode change from single 5G (dedicated scan enabled) to dual 5G is not taking effect.

853414

Policy and dashboard widgets do not load when the FortiGate manages a FortiSwitch with tenant ports (exported from root to other VDOM).

854529

The local standalone mode in a VAP configuration is disabled when viewing or updating its settings in the GUI.

861466

The Active Administrator Sessions widget shows the incorrect interface when accessing the firewall through the GUI.

862474

IPsec tunnel interface Bandwidth widget inbound is zero and outbound value is lower than the binding interface.

865956

On the Network > Policy Routes page, entries cannot be copied and pasted above or below.

866790

System > Firmware & Registration menu is not visible for administrator accounts without read-write permissions for the sysgrp-permission category.

867802

GUI always displays Access denied error after logging in.

869138

Unable to select addresses in FortiView monitors.

869828

An httpsd crash occurs when the GUI fails to get the disk log settings from the FortiGate.

870675

CLI console in GUI reports Connection lost. when the administrator has more than 100 VDOMs assigned.

874502

An access privilege prompt is not displayed when logging in to the GUI of a FortiGate managed by a FortiManager with post-login-banner enabled. The user is logged in with read-only permissions.

881678

On the Network > Routing Objects page, editing a prefix list with a large number of rule entries fails with an error notification that The integer value is not within valid range.

889647

CLI console disconnects and has '/tmp/daemon_debug/node_...' crash.

890531

Node.JS boots earlier than autod, which leads to a Node.JS crash.

890683

GUI being exposed to port 80 on the interfaces defined in the ACME settings, even if administrative access is disabled on the interface.

891895

When remotely accessing the FortiGate from FortiGate Cloud, the web GUI console displays Connection lost. Press Enter to start a new session.

897004

On rare occasions, the GUI may display blank pages when the user navigates from one menu to another if there is a managed FortiSwitch present.

898386

Browser returns a blank page after logging in to the GUI with an IPv6 address.

HA

Bug ID

Description

662978

Long lasting sessions are expired on HA secondary device with a 10G interface.

795443

The execute reboot script does not work in HA due to a HA failover before the script running is done.

826790

DHCP over IPsec is not working in an FGSP cluster.

843837

HA A-P virtual cluster information is not correctly presented in the GUI and CLI.

852308

New factory reset box failed to synchronize with primary, which was upgraded from 7.0.

853900

The administrator password-expire calculation on the primary and secondary returns a one-second diff, and causes HA to be out-of-sync.

854445

When adding or removing an HA monitor interface, the link failure value is not updated.

855841

In an HA A-P environment, an old administrator user still exists in the system after restoring the backup.

856004

Telnet connection running ping fails during FGSP failover for virtual wire pair with VLAN traffic.

856643

FG-500E interface stops sending IPv6 RAs after upgrading from 7.0.5 to 7.0.7.

859242

Unable to synchronize IPsec SA between FGCP members after upgrading.

860497

Output of diagnose sys ntp status is misleading when run on a secondary cluster member.

864226

FG-2600F kernel panic occurs after a failover on both members of the cluster.

868622

The session is not synchronized after HA failover by detecting monitored interface as down.

869557

Upgrading or re-uploading an image to the HA secondary node causes the OS to be un-certified.

870367

FGCP A-P devices get out of HA synchronization periodically due to FortiTokens being added and deleted.

872431

Primary FortiGate synchronizes the changing HA command to the secondary.

874823

FGSP session-sync-dev ports do not use L2 Ethernet frames but always use UDP, which reduces the performance.

876178

hasync crashing with signal 6 after upgrading to 7.2.3 from 7.0.7.

878173

When downloading the speed test server list, the HA cluster gets and stays out-of-sync.

885245

Unexpected failover occurs due to uptime, even if the uptime difference is less than the ha-uptime-diff-margin.

885844

HA shows as being out-of-sync after upgrading due to a checksum mismatch for endpoint-control fctems.

Hyperscale

Bug ID

Description

804742

After changing hyperscale firewall policies, it may take longer than expected for the policy changes to be applied to traffic. The delay occurs because the hyperscale firewall policy engine enhancements added to FortiOS may cause the FortiGate to take extra time to compile firewall policy changes and generate a new policy set that can be applied to traffic by NP7 processors. The delay is affected by hyperscale policy set complexity, the total number of established sessions to be re-evaluated, and the rate of receiving new sessions.

807523

On NP7 platforms the config system npu option for nat46-force-ipv4-packet-forwarding is missing.

810366

Unrelated background traffic gets impacted when changing a policy where a hyperscale license is used.

824733

IPv6 traffic continues to pass through a multi-VDOM setup, even when the static route is deleted.

832924

Timeouts occur when accessing the Migros Bank e-banking application and https://www.gs***.ch/ when the session is offloaded.

835697

Interface routes under DHCP mode remain in LPMD after moving the interface to another VDOM.

837270

Allowing intra-zone traffic is now supported in hyperscale firewall VDOMs. Options to block or allow intra-zone traffic are available in the GUI and CLI.

841712

On FortiGates licensed for hyperscale firewall features, the config system setting options nat46-force-ipv4-packet-forwarding and nat64-force-ipv6-packet-forwarding now also apply to NP7-offloaded traffic. The config system npu option nat46-force-ipv4-packet-forwarding has been removed.

877696

Get KTRIE invalid node related error and kernel panic on standby after adding a second device into A-P mode HA cluster.

Intrusion Prevention

Bug ID

Description

810783

The number of IPS sessions is higher than kernel sessions, which causes the FortiGate to enter conserve mode.

839170

Improvements to IPS engine monitor to resolve an error condition during periods of heavy traffic loads.

842073

Improvements to IPS engine to optimize CPU usage when a decrypted traffic mirror profile is applied to policies in flow mode.

856837

Improvements to IPS engine to optimize memory usage when flow mode antivirus is applied.

883600

Under config ips global, configuring set exclude-signatures none does not save to backup configuration.

886685

IPS daemon usage issue when notifying device vulnerability information to WAD.

IPsec VPN

Bug ID

Description

699973

IPsec aggregate shows down status on Interfaces, Firewall Policy, and Static Routes configuration pages.

726326, 745331

IPsec server with NP offloading drops packets with an invalid SPI during rekey.

788751

IPsec VPN Interface shows incorrect TX/RX counter.

797342

Users cannot define an MTU value for the aggregate VPN.

798045

FortiGate is unable to install SA (failed to add SA, error 22) when there is an overlap in configured selectors.

810833

IPsec static router gateway IP is set to the gateway of the tunnel interface when it is not specified.

812229

ASCII-encoded byte code of remote gateway IP is displayed in the GUI and CLI when a VPN tunnel is formed using IKEv1 or v2 if the peer-id is not configured.

828933

iked signal 11 crash occurs once when running a VPN test script.

842571

If mode-cfg is used, a race condition can result in an IP conflict and sporadic routing problems in an ADVPN/SD-WAN network. Connectivity can only be restored by manually flushing the IPsec tunnels on affected spokes.

848014

ESP tunnel traffic hopping from VRF.

849515

ADVPN dynamic tunnel is picking a tunnel ID that is within another VPN interface IP range.

852868

Issues with synchronization of the route information (using add-route option) on spokes during HA failover that connect to dialup VPN.

855705

NAT detection in shortcut tunnel sometimes goes wrong.

855772

FortiGate IPsec tunnel role could be incorrect after rebooting or upgrading, and causes negotiation to be stuck when it comes up.

858681

When upgrading from 6.4.9 to 7.0.6 or 7.0.8, the traffic is not working between the spokes on the ADVPN environment.

858697

Native IPsec iOS authentication failure using LDAP account with two-factor authentication.

858715

IPsec phase 2 fails when both HA cluster members reboot at the same time.

861195

In IPsec VPN, the fnbamd process crashes when the password and one-time password are entered in the same Password field of the VPN client.

869166

IPsec tunnel does not coming up after the upgrading firmware on the branch FortiGate (FG-61E).

873097

Phase 2 not initiating the rekey at soft limit timeout on new kernel platforms.

876795

RADIUS server will reject new authentication if a previous session is missing ACCT-STOP to terminate the session, which causes the VPN connection to fail.

882483

ADVPN spoke does not delete the BGP route entry to another spoke over IPsec when the IPsec VPN tunnel is down.

885818

If a tunnel in an IPsec aggregate is down but its DPD link is on, the IPsec aggregate interface may still forward traffic to a down tunnel causing traffic to drop.

887800

In an L2TP configuration, set enforce-ipsec enable is not working as expected after upgrading.

891462

The Peer ID field in the IPsec widget should not show a warning message that Two-factor authentication is not enabled.

892699

In an HA cluster, static routes via the IPsec tunnel interface are not inactive in the routing table when the tunnel is down.

899822

IPsec dialup tunnel interface does not appear in the Interface dropdown of a Dashboard > Status > Interface Bandwidth widget.

916260

The IPsec VPN tunnel list can take more than 10 seconds to load if the FortiGate has large number of site-to-site tunnels. This is a GUI display issue and does not impact tunnel operation.

Log & Report

Bug ID

Description

755632

Unable to view or download generated reports in the GUI if the report layout is custom.

795272

Local out DNS traffic is generating forward traffic logs with srcintf "unknown-0".

823183

FortiGates are showing Logs Queued in the GUI after a FortiAnalyzer reboot, even tough the queued logs were actually all uploaded to FortiAnalyzer and cleared when the connection restores.

825318

Archived Data tab is missing from intrusion prevention and application control log Details pane once log-packet is enabled.

828211

Policy ID filter is not working as expected.

829862

On the Log & Report > ZTNA Traffic page, the client's Device ID is shown as [object Object]. The Log Details pane show the correct ID information.

836846

Packet captured by firewall policy cannot be downloaded.

838357

A deny policy with log traffic disabled is generating logs.

839601

When log pages are scrolled down, no logs are displayed after 500 lines of logs.

850519

Log & Report > Forward Traffic logs do not return matching results when filtered with !<application name>.

857573

Log filter with negation of destination IP display all logs.

858304

When FortiGate Cloud logging is enabled, the option to display 7 days of logs is not visible on the Dashboard > FortiView pages.

858589

Unable to download more than 500 logs from the FortiGate GUI.

860141

Syslog did not update the time after daylight saving time (DST) adjustment.

860264

The miglogd process may send empty logs to other logging devices.

860459

Unable to back up logs (FG-201E).

860487

Incorrect time and time zone appear in the forward traffic log when timezone is set to 18 (GMT-3 Brasilia).

861567

In A-P mode, when the link monitor fails, the event log displays a description of ha state is changed from 0 to 1.

864219

A miglogd crash occurs when creating a dynamic interface cache on an ADVPN environment.

872181

On the Log & Report > Log Settings > Local Logs page, the Local reports and Historical FortiView settings cannot be enabled.

872326

FortiGate cannot retrieve logs from FortiAnalyzer Cloud. Results are shown rarely.

873987

High memory usage from miglogd processes even without traffic.

879228

FortiAnalyzer override settings are not taking effect when ha-direct is enabled.

906888

Free-style filter not working as defined under config fortianalyzer override-filter.

918571

The log_se process resource utilization is causing a network outage.

Proxy

Bug ID

Description

707827

The video filter does not display the proper replacement message when the user redirects to a blocked video from the YouTube homepage or video recommendation list.

746587

Error condition in WAD occurs during traffic scans in proxy mode.

766158

Video filter FortiGuard category takes precedence over allowed channel ID exception in the same category.

781613

Intermittent traffic disruption caused by race condition in WAD.

796150, 857507

When a server sends a connection close response too early, traffic from the client may be interrupted inadvertently before the request is completed.

818371

An error condition occurs in WAD while parsing certain URIs.

823078

Improvements to WAD to optimize CPU usage when using user groups.

825977

An error condition occurs in WAD during an AV scan submission.

834387

In a firewall proxy policy, the SD-WAN zone assigned to interface is not checked.

835745

An error condition occurs in WAD when the srcintf of a firewall proxy-policy is set to an SD-WAN zone.

853864

FortiGate out-of-band certificate check issue occurs in a proxy mode policy with SSL inspection.

854511

Unable to make API calls using Postman Runtime script after upgrading to 7.2.0.

855853

Improvements to WAD to optimize CPU usage when using user groups.

855882

Improvements to WAD to resolve a memory usage issue when user-info updates the FortiAP information.

856235

The WAD process memory usage gradually increases over a few days, causing the FortiGate to enter into conserve mode.

857368

An encoded HTTP header may be improperly handled, causing inadvertent disruption to traffic.

858148

Memory usage issue caused by the WAD user-info history daemon.

870151

Memory usage issue occurs on the WAD worker in a specific scenario.

870554

An error condition occurs in WAD when the dstaddr6 of a firewall proxy-policy is set to an IPv6 address.

874563

User information attributes can cause disruption when they are not properly merged.

880712

An error condition occurs in WAD due to an improper NULL check.

885674

Unable to send logs from FortiClient to FortiAnalyzer when deep inspection is enabled on firewall policy.

886284

An error condition occurs in WAD when a task is queued in the dev-vuln daemon and the user-info daemon restarts.

REST API

Bug ID

Description

847526

Able to add incomplete policies with empty mandatory fields using the REST API.

849273

/api/v2/monitor/system/certificate/download can still download already deleted CSR files.

864393

High CPU usage of httpsd on FG-3600E HA system.

886012

The MTU value on an interface cannot be set using the interface REST API.

892237

Updating the HA monitor interface using the REST API PUT request fails and returns a -37 error.

Remote Access

Bug ID

Description

837391

FortiClient does not send the public IP address for SAML, resulting in 0.0.0.0 being shown in FortiOS and SASE.

Routing

Bug ID

Description

708904

No IGMP-IF for ifindex log points to multicast enabled interface.

724468

Router policy destination address not take effect when internet-service-id is configured.

821149

Early packet drop occurs when running UTM traffic on virtual switch interface.

827565

Using set load-balance-mode weight-based in SD-WAN implicit rule does not take effect occasionally.

846107

IPv6 VRRP backup is sending RA, which causes routing issues.

848310

IPsec traffic sourced from a loopback interface does not follow the policy route or SD-WAN rules.

850778

Spoke-to-spoke communication randomly breaks. The BGP route to reach the spoke subnet points to the main ADVPN tunnel instead of the shortcut tunnel.

850862

When creating a new rule on the Network > Routing Objects page, the user cannot create a route map with a rule that has multiple similar or different AS paths in the GUI.

856462

When there are multiple routes in the link monitor, they are not withdrawn from the routing table when the link monitor is not functioning as expected.

860075

Traffic session is processed by a different SD-WAN rule and randomly times out.

862165

FortiGate does not add the route in the routing table when it changes for SD-WAN members.

862418

Application VWL crash occurs after FortiManager configuration push causes an SD-WAN related outage.

862573

SD-WAN GUI does not load, and the lnkmtd process crashes frequently.

863318

Application forticron signal 11 (Segmentation fault) received.

865914

When BSM carries multiple CRPs, PIM might use the incorrect prefix to update the mroute's RP information.

870983

Unable to set local-as in BGP confederation configuration.

883918

Delay in joining (S,G) in PIM-SM.

884372

All BGP routes in dual ADVPN redundant configuration are not getting updated to the correct WAN interface post-rollback to WAN failover.

890379

After upgrading, SD-WAN is unable to fail over the traffic when one interface is down.

893603

GUI does not show gateway IP on the routing table page if VDOM mode is transparent.

897940

Link monitor's probe timeout value range is not appropriate when the user decreases the minimum interval.

Security Fabric

Bug ID

Description

753177

IoT device vulnerabilities should be included in security ratings.

809106

Security Fabric widget and Fabric Connectors page do not identify FortiGates properly in HA.

814796

The threat level threshold in the compromised host trigger does not work.

819192

After adding a Fabric device widget, the device widget does not appear in the dashboard.

825291

Security rating test for FortiAnalyzer fails when connected to FortiAnalyzer Cloud.

832015

Root FortiGate cannot finish the security rating with a large Fabric topology (more than 25 to 30 devices) because the REST API is not limited to the local network.

841364

Cisco APIC SDN update times out on large datasets.

844412

When a custom LLDP profile has auto-isl disabled, the security rating test, Lockdown LLDP Profile, fails.

848822

The FortiAP Firmware Versions and FortiSwitch Firmware Versions security rating tests fail because the firmware version on the FortiAPs and FortiSwitches is not recognized correctly.

851656

Sessions with csf_syncd_log flag in a Security Fabric are not logged.

852340

Various places in the GUI do not show the secondary HA device.

862424

On a FortiGate that has large tables (over 1000 firewall policies, address, or other tables), security rating reports may cause the FortiGate to go into conserve mode.

862532

Unable to load topology pages for a specific Security Fabric topology on the root and downstream FortiGates.

867313

Error triggering automation stitch message appears when the license expiry notification type is FortiGuard Web Filter.

868701

In a simple cluster, the primary unit failed to upgrade to 7.2.3.

870527

FortiGate cannot display more than 500 VMs in a GCP dynamic address.

875100

Unable to remove external resource in a certain VDOM when the external resource has no reference in that VDOM.

880011

When the Security Fabric is enabled and admin-https-redirection is enabled on a downstream FortiGate, the following GUI features do not work for the downstream FortiGate when the administrator manages the downstream FortiGate using the root FortiGate's GUI:

  • Web console access
  • Diagnostic packet capture
  • GUI notification when a new device joins or leaves the Security Fabric
  • GUI notification if a configuration on the current page changes

These features still work for the root FortiGate's GUI.

885810

The gcpd daemon constantly crashes (signal 11 segmentation fault).

887967

Fabric crashes when synchronizing objects with names longer than 64 characters.

907172

Automation stitch with FortiDeceptor Fabric connector event trigger cannot be triggered.

SSL VPN

Bug ID

Description

710657

The dstaddr/dstaddr6 of an SSL VPN policy can be set to all when split tunnel mode is enabled and only the default portal is set.

719740

The No SSL-VPN policies exist warning is displayed when an SSL VPN zone having an SSL VPN tunnel interface is used in a policy. The warning can be ignored; it does not affect the SSL VPN functionality.

746440

When sending the SSL VPN settings email (VPN > SSL-VPN Settings > Send SSL-VPN Configuration), the Email template only includes a hyperlink to the configuration, which is not supported by Gmail and Fortinet email.

748085

Authentication request of SSL VPN realm can now only be sent to user group, local user, and remote group that is mapped to that realm in the SSL VPN settings. The authentication request will not be applied to the user group and remote group of non-realm or other realms.

787768

The web-mode setting should not be enabled when the portal is mapped in an SSL VPN policy where a VIP is applied.

808107

FortiGate is not sending Accounting-Request packet that contains the Interim-Update AVP when two-factor authentication is assigned to a user (defined on the FortiGate) while connecting using SSL VPN.

810239

Unable to view PDF files in SSL VPN web mode.

819754

Multiple DNS suffixes cannot be set for the SSL VPN portal.

828194

SSL VPN stops passing traffic after some time.

839261

On the VPN > SSL-VPN Settings page, when the source-address-negate option is enabled for an address in the CLI, the GUI does not display an exclamation mark against that address entry in the Hosts field.

This is cosmetic and does not affect on the FortiGate functionality or operation. The source-address-negate option being enabled can be confirmed in the CLI.

850898

OS checklist for the SSL VPN in FortiOS does not include macOS Ventura (13).

852566

User peer feature for one group to match to multiple user peers in the authentication rules is broken.

854143

Unable to access Synology NAS server through SSL VPN web mode.

854642

Internal website with JavaScript is proxying some functions in SSL VPN web mode, which breaks them.

856316

Browser displays an Error, Feature is not available message if a file larger than 1 MB is uploaded from FTP or SMB using a web bookmark, even though the file is uploaded successfully. There are no issues with downloading files.

856554

SSL VPN web mode top-right dropdown button (user profile menu) does not work.

859115

SSL VPN bookmark not accessible.

863860

RDP over SSL VPN web mode to a Windows Server changes the time zone to GMT.

864096

EcoStruxure Building Operations 2022 does not render using SSL VPN bookmark.

864417

In the second authentication of RADIUS two-factor authentication, the acct-update-interval returned is 0. SSL VPN uses the second return and not send RADIUS acct-interim-update packet.

867182

RDP/VNC host name is not encrypted when URL obscuration is enabled.

870061

Kernel does not delete original route after address assigned to the client changes.

873313

SSL VPN policy is ignored if no user or user group is set and the FSSO group is set.

873995

Problem with the internal website using SSL VPN web mode.

877896

When accessing the VDOM's GUI in SSL VPN web mode, policies are only shown for a specific VDOM instead of all VDOMs.

884860

SSL VPN tunnel mode gets disconnected when SSL VPN web mode is disconnected by limit-user-logins.

890876

One of the speed-connect website JavaScript files has trouble with host process.

Switch Controller

Bug ID

Description

730472

FortiSwitch enabled VLANs with VLAN and proxy ARP access have large latencies on initial ARP resolutions.

762615, 765283

FortiSwitches managed by FortiGate go offline intermittently and require a FortiGate reboot to recover.

769722

Support FortiLink to recognize a FortiSwitch based on its name and not just by serial number.

853718

Layer 3 FortiLink does not come up after upgrading.

854104

FortiLink daemon keeps pushing the configuration to FortiSwitch for a long time when the FortiSwitch is deleted and re-discovered.

857778

Switch controller managed switch port configuration changes do not take effect on the FortiSwitch.

858113

On the WiFi & Switch Controller > Managed FortiSwitches page, when an administrator with restricted access permissions is logged in, the Diagnostics and Tools page for a FortiSwitch cannot be accessed.

876021

FortiLink virtually managed switch port status is not getting pushed after the FortiGate reboots.

886887

When a MAC VLAN appears on the same MCLAG trunk, continuous event logs are received on FortiGate and FortiAnalyzer.

System

Bug ID

Description

550701

Inadvertent traffic disruption caused by WAD due to deadlock.

649729

HA synchronization packets are hashed to a single queue when sync-packet-balance is enabled.

666664

Interface belonging to other VDOMs should be removed from interface list when configuring a GENEVE interface.

700621

The forticron daemon is constantly being restarted.

709679

Get can not set mac address(16) error message when setting a MAC address on an interface in HA that is already set.

713951

Not all ports are coming up after an LAG bounce on 8 × 10 GB LAG with ASR9K. Affected platforms: FG-3960E and FG-3980E.

722273

SA is freed while its timer is still pending, which leads to a kernel crash.

724085

Traffic passing through an EMAC VLAN interface when the parent interface is in another VDOM is blocked if NP7 offloading is enabled.

729912

DNS proxy does not transfer the DNS query for IPv6 neighbor discovery (ND) when client devices are using random MAC addresses, so one device can configure many IPv6 addresses.

748496

Wrong IP displayed in GUI widget if FortiGuard anycast AWS is used.

776646

On the Network > Interfaces page, configuring a delegated interface to obtain the IPv6 prefix from an upstream DHCPv6 server fails with an error notification (CLI internal error).

784169

When a virtual switch member port is set to be an alternate by STP, it should not reply with ARP; otherwise, the connected device will learn the MAC address from the alternate port and send subsequent packets to the alternate port.

790595

Improve dnsproxy process memory management.

799570

High memory usage occurs on FG-200F.

805122

In FIPS-CC mode, if cfg-save is set to revert, the system will halt a configuration change or certificate purge.

807629

NP7 dos-offload triggers an established TCP session to have synproxy process issues.

810137

Scheduled speed test crash is caused by adding the same object to a list twice.

810879

DoS policy ID cannot be moved in GUI and CLI when multiple DoS policies are enabled.

812957

When setting the speed of 1G SFP ports on FG-180xF platforms to 1000full, the interface does not come up after rebooting.

813607

LACP interfaces are flapping after upgrading.

815937

FCLF8522P2BTLFTN transceiver is not working after upgrade.

818897

The value of SNMP OID IP-MIB (RFC 4293) is inaccurate.

820268

VIP traffic access to the EMAC VLAN interface uses incorrect MAC address on NP7 platform.

826490

NP7 platforms may reboot unexpectedly when unable to handle kernel null pointer dereference.

827240

FortiGate may not provide detailed information during a watchdog-initiated reboot.

828129

A disabled EMAC VLAN interface is replying to a ping.

836409

When deleting a non-existing entry, the error code returned is not appropriate.

838933

DoS anomaly has incorrect threshold after loading a modified configuration file.

840960

When kernel debug level is set to >=KERN_INFO on NP6xLite platforms, some tuples missing debug messages may get flooded and cause the system to get stuck.

845736

After rebooting the FortiGate, the MTU value on the VXLAN interface was changed.

847314

NP7 platforms may encounter random kernel crash after reboot or factory reset.

850683

Console keeps displaying bcm_nl.nr_request_drop ... after the FortiGate reboots because of the cfg-save revert setting under config system global. Affected platforms: FG-10xF and FG-20xF.

850688

FG-20xF system halts if setting cfg-save to revert under config system global and after the cfg-revert-timeout occurs.

852562

Huge configuration files cause delays during the booting process.

853144

Network device kernel null pointer is causing a kernel crash.

853794

Issue with the server_host_key_algorithm compatibility when using SSH on SolarWinds.

853811

Fortinet 10 GB transceiver LACP flapping when shut/no shut was performed on the interface from the switch side.

854388

Configuring set src-check disable is not persistent in the kernel after rebooting for GRE interfaces.

855573

False alarm of the PSU2 occurs with only one installed.

855775

Time zone for Kyiv, Ukraine is missing.

856202

Random reboots and kernel panic on NP7 cluster when the FortiGate sends a TCP RST packet and IP options are missing in the header.

859717

The FortiGate is only offering the ssh-ed25519 algorithm for an SSH connection.

859795

High CPU utilization occurs when relay is enabled on VLAN, and this prevents users from getting an IP from DHCP.

860052

The 40G/100G port goes down on FG-260xF when upgrading to 7.2.

860385

IPv6 BGP session drops when passing through a FortiGate configured with VRF.

862941

GUI displays a blank page if vdom-admin user has partial permissions.

867428

Add check to skip invalid names when creating a VDOM.

867435

FG-400E-BP has crash at initXXXXXXXXXXX[1]: segfault at 3845d5a after package validation fails.

867978

Subnet overlap error occurs when configuring the same IPv4 link-local addresses on two different interfaces.

868225

After a cold reboot (such as a power outage), traffic interfaces may not come up with a possible loss of VLAN configurations.

868821

execute ssh-regen-keys should be global-level command.

869599

Forticron memory is leaking.

870381

Memory corruption or incorrect memory access when processing a bad WQE.

872391

The session output of dia sys npu-session list shows wrong duration when the session is very long (+40 hours).

875868

HQIP test fails on FG-2201E.

876403

ACME auto-renewal is not performed after HA failover.

876853

No output of execute sensor list is displayed after rebooting.

876874

The Dashboard > Status > Sensor Information widget does not load.

877039

On the Network > BGP page, creating or editing a table entry increases memory consumption of the FortiGate to 99%.

877154

FortiGate with new kernel crashes when starting debug flow.

877240

Get zip conf file failed -1 error message when running a script configuring the FortiGate.

878400

When traffic is offloaded to an NP7 source MAC, the packets sent from the EMAC VLAN interface are not correct.

880290

NP7 is not configured properly when the ULL ports are added to LAG interface, which causes accounting on the LAG to not work.

881094

FG-3501F NP7 is dropping all traffic after it is offloaded.

883071

Kernel panic occurs due to null pointer dereference.

887772

CPU usage issue in WAD caused by checking authentication group member information.

889634

Unable to configure IPv6 setting on system interface (FWF-81F-2R-POE).

891841

Unable to handle kernel NULL pointer dereference at 0000000000000000 for NP7 device; the device keeps rebooting.

894045

Sensor information widget continuously loading.

899884

FG-3000F reboots unexpectedly with NULL pointer dereference.

909345

An error condition occurs caused by receiving ICMP redirect messages.

Upgrade

Bug ID

Description

850691

The endpoint-control fctems entry 0 is added after upgrading from 6.4 to 7.0.8 when the FortiGate does not have EMS server, which means the endpoint-control fctems feature was not enabled previously. This leads to a FortiManager installation failure.

892647

Static route configurations were lost upgrading from 7.0.7 to 7.2.3.

900761

FG-601E crashes randomly after upgrading to 7.0.8 and 7.0.11.

903113

Upgrading FortiOS firmware with a local file from 6.2.13, 6.4.12, 7.0.11, or 7.2.4 and earlier may fail for certain models because the image file size exceeds the upload limit. Affected models: FortiGate 6000 and 7000 series, FWF-80F-2R, and FWF-81F-2R-POE.

User & Authentication

Bug ID

Description

751763

When MAC-based authentication is enabled, multiple RADIUS authentication requests may be sent at the same time. This results in duplicate sessions for the same device.

823884

When a search is performed on a user (User & Authentication > User Definition page), the search results highlight all the groups the user belongs to.

837185

Automatic certificate name generation is the same for global and VDOM remote certificates, which can cause certificates to exist with the same name.

843528

RADIUS MAC authentication using ClearPass is intermittently using old credentials.

846545

LDAPS connectivity test fails with old WinAD after OpenSSL was upgraded to 3.0.2.

853793

FG-81F 802.1X MAC authentication bypass (MAB) failed to authenticate Cisco AP.

855898

All devices are detected as Other identified device in the Device Inventory widget.

856370

The EAP proxy worker application crashes frequently.

857438

SSL VPN group matching does not work as expected for Azure auto login.

858961

Client's firewall authentication session timeout is set to 900 when it passes MAC authentication bypass by ping.

859845

In some cases, the proper hostnames are not showing up when looking at APs on the FortiSwitch ports screen.

864703

ACME client fails to work with some CA servers.

865166

A cid scan crash occurs when device detections happen in a certain order.

867225

ARP does not trigger FortiGuard device identification query.

VM

Bug ID

Description

740796

IPv6 traffic triggers <interface>: hw csum failure message on CLI console.

856645

Session is not crated over NSX imported object when traffic starts to flow.

859165

Unable to enable FIPS cipher mode on FG-VM-ARM64-AWS.

859589

VPNs over Oracle Cloud stop processing traffic.

860096

CPU spike observed on all the cores in a GCP firewall VM.

868698

During a same zone AWS HA failover, moving the secondary IP will cause the EIP to be in a disassociated state.

869359

Azure auto-scale HA shows certificate error for secondary VM.

878074

FG-ARM64-GCP and FG-ARM64-AZURE have HA synchronization issue with internal IP after failover.

881728

Kernel hangs on FG-VM64-AZURE.

883203

FG-AWS SDN is unable to retrieve EKS cluster information, even thought its role is trusted by the EKS role.

883896

Backup virtual server not working as expected (ERR_EMPTY_RESPONSE).

885829

Azure SDN connector stopped processing when Azure returned NotFound error for VMSS interface from an AD DS-managed subscription.

890278

FG‑VM Rackspace On-Demand upgrade from 7.2.3 to 7.2.4 breaks the pay-as-you-go license, and reverts it to an evaluation license.

902816

An error condition occurs after a failover on the HA cluster deployed on an FG-VM64-AZURE.

912184

An error condition is observed after deploying an FG-VM64-AZURE in Standard_DS4_v2 size.

VoIP

Bug ID

Description

757477

PRACK will cause voipd crashes when the following conditions are met: block-unknown is disabled in the SIP profile, the PRACK message contains SDP, and PRACK fails to find any related previous transactions (this is not a usual case).

Web Filter

Bug ID

Description

766126

Block replacement page is not pushed automatically to replace the video content when using a video filter.

807277

Video filter function does not block YouTube stream after accessing some allowed channels.

856793

In flow mode, URL filter configuration changes cause a spike in CPU usage of the IPS engine process.

863728

The urlfilter process causes a memory leak, even when the firewall policy is not using the web filter feature.

878442

FortiGuard block page image (logo) is missing when the Fortinet-Other ISDB is used.

WiFi Controller

Bug ID

Description

807605

FortiOS exhibits segmentation fault on hostapd on the secondary controller configured in HA.

821320

FG-1800F drops wireless client traffic in L2 tunneled VLAN with capwap-offload enabled.

825182

The 6 GHz channel lists should be updated according to the latest WiFi country region channels map.

828901

Connectivity loss occurs due to switch and FortiAPs (hostapd crash).

831736

Application hostapd crash found on FG-101F.

834644

A hostapd process crash is shown in device crash logs.

835783

CAPWAP traffic is not offloaded when re-enabling capwap-offload.

837130

Wireless client shows portal related webpage while doing MAC authentication with MAB mode.

846730

Dynamic VLAN assignment is disabled in the GUI when editing an SSID with radius mac-auth and dynamic-vlan enabled.

856038

The voice-enterprise value changed after upgrading.

856830

HA FortiGate encounters multiple hostapd crashes.

857084

Hostapd segmentation fault signal 6 occurs upon HA failover.

857140

Hostapd segmentation fault signal 11 occurs upon RF chamber setup.

857975

The cw_acd process appears to be stuck, and is sending several access requests for MAC authentication.

858653

Invalid wireless MAC OUI detected for a valid client on the network.

861552

Wireless client gets disconnect from WiFi if it is connected to a WPA2 SSID more than 12 hours.

865260

Incorrect source IP used in the self-originating traffic to RADIUS server.

868022

Wi-Fi clients on a RADIUS MAC MPSK SSID get prematurely de-authenticated by the secondary FortiGate in the HA cluster.

874997

Fetching the registration status does not always work.

882551

FortiWiFi fails to act as the root mesh AP, and leaf AP does not come online.

891625

Quarantined STA connected to a long interface name VAP is not moved to quarantined VLAN 4093.

892575

MPSK SSID with mpsk-schedules stopped working after the system time was changed due to daylight saving time.

ZTNA

Bug ID

Description

832508

The EMS tag name (defined in the EMS server's Zero Trust Tagging Rules) format changed in 7.2.1 from FCTEMS<serial_number>_<tag_name> to EMS<id>_ZTNA_<tag_name>.

After upgrading from 7.2.0 to 7.2.1, the EMS tag format was converted properly in the CLI configuration, but the WAD daemon is unable to recognize this new format, so the ZTNA traffic will not match any ZTNA policies with EMS tag name checking enabled.

859421

ZTNA server (access proxy VIP) is causing all interfaces that receive ARP request to reply with their MAC address.

863057

ZTNA real server address group gets unset once the FortiGate restarts.

865316

Adding an EMS tag on the Policy & Objects > Firewall Policy edit page for a normal firewall policy forces NAT to be enabled.

875589

An error case occurs in WAD when a client EMS tag changes.

887307

CPU usage issue in WAD caused by checking authentication group member information.

Common Vulnerabilities and Exposures

Visit https://fortiguard.com/psirt for more information.

Bug ID

CVE references

843318

FortiOS 7.2.5 is no longer vulnerable to the following CVE Reference:

  • CVE-2023-41675

854906

FortiOS 7.2.5 is no longer vulnerable to the following CVE Reference:

  • CVE-2022-45862

860282

FortiOS 7.2.5 is no longer vulnerable to the following CVE Reference:

  • CVE-2023-33307

875854

FortiOS 7.2.5 is no longer vulnerable to the following CVE Reference:

  • CVE-2023-28001

887734

FortiOS 7.2.5 is no longer vulnerable to the following CVE Reference:

  • CVE-2023-33306

892978

FortiOS 7.2.5 is no longer vulnerable to the following CVE Reference:

  • CVE-2023-33301

894168

FortiOS 7.2.5 is no longer vulnerable to the following CVE Reference:

  • CVE-2023-29183

894631

FortiOS 7.2.5 is no longer vulnerable to the following CVE Reference:

  • CVE-2023-29178

896403

IPS Engine 7.00314 is no longer vulnerable to the following CVE Reference:

  • CVE-2023-40718

898402

FortiOS 7.2.5 is no longer vulnerable to the following CVE Reference:

  • CVE-2023-27997

899434

FortiOS 7.2.5 is no longer vulnerable to the following CVE Reference:

  • CVE-2023-41841

918991

FortiOS 7.2.5 is no longer vulnerable to the following CVE Reference:

  • CVE-2023-36639

Resolved issues

Resolved issues

The following issues have been fixed in version 7.2.5. To inquire about a particular bug, please contact Customer Service & Support.

Anti Spam

Bug ID

Description

857911

The Anti-Spam Block/Allow List Entry dialog page is not showing the proper Type values in the dropdown.

877613

Mark as Reject can be still chosen as an Action in an Anti-Spam Block/Allow List in the GUI.

Anti Virus

Bug ID

Description

818092

CDR archived files are deleted at random times and not retained.

849020

FortiGate may enter conserve mode while performing Content Disarm and Reconstruction (CDR) parsing on certain MS Office documents with a .tmp extension.

851706

Nothing is displayed in the Advanced Threat Protection Statistics dashboard widget.

863461

Scanunit displays unclear warnings when AV package validation fails.

869398

FortiGate sends too many unnecessary requests to FortiSandbox and causes high resource usage.

895950

Critical log message, Fortigate mmdb signature is missing, is generated on a unit without an AVDB contract.

Application Control

Bug ID

Description

857632

Unable to access to some websites when application control with deep inspection is enabled.

DNS Filter

Bug ID

Description

871854

DNS UTM log still presents unknown FortiGuard category even when the DNS proxy received a rating value.

878674

Forward traffic log is generated for allowed DNS traffic if the DNS filter is enabled but the policy is set to log security events only.

Explicit Proxy

Bug ID

Description

842016

Client gets 304 response if a cached object has varying headers and is expired.

849794

Random websites are not accessible with proxy policy after upgrading to 6.4.10.

865135

Multipart boundary parsing failed with CRLF before the end of boundary 1.

875736

The proxy-re-authentication-mode option has been removed in 7.2.4 and is replaced with proxy-keep-alive-mode re-authentication. The new proxy-re-authentication-time timer is associated with this re-authentication mode. There are two unresolved issues:

  • After upgrading, the previously configured proxy-auth-timeout value for the absolute re-authentication mode is not preserved in the new proxy-re-authentication-time.
  • The new proxy-re-authentication-time is currently configured in seconds, but it should be configured in minutes to be consistent with other related authentication timers (such as proxy-auth-timeout).

880361

Transparent web proxy policy has no match if the source or destination interface is the same and member of SD-WAN.

901239

Unexpected behavior in WAD caused by deploying virtual servers in non-server pool mode.

901614

Firewall schedule does not work as expected with a proxy policy.

Firewall

Bug ID

Description

719311

On the Policy & Objects > Firewall Policy page in 6.4.0 onwards, the IPv4 and IPv6 policy tables are combined but the custom section name (global label) is not automatically checked for duplicates. If there is a duplicate custom section name, the policy list may show empty for that section. This is a display issue only and does not impact policy traffic.

770541

Within the Policy & Objects menu, the firewall, DoS, and traffic shaping policy pages take around five seconds to load when the FortiGate cannot reach the FortiGuard DNS servers.

804603

An httpsd signal 6 crash occurs due to /api/v2/monitor/license/forticare-resllers.

816493

The set sub-type ems-tag option is blocked in HA diff installation.

835413

Inaccurate sFlow interface data reported to PRTG after upgrading to 7.0.

840689

Virtual server aborts connection when ssl-max-version is set to tls-1.3.

848058

NPD failed to parse zone in the source interface of a DoS/ACL policy and failed to offload.

851212

After traffic flow changes to FGSP peer from owner, iprope information for synchronized sessions does not update on the peer side.

854901

Full cone NAT (permit-any-host enable) causes TCP session clash.

856187

Explicit FTPS stops working with IP pool after upgrading.

860480

FG-3000D cluster kernel panic occurs when upgrading from 7.0.5 to 7.0.6 and later.

861981

Traffic drops between two back-to-back EMAC VLAN interfaces.

861990

Increased CPU usage in softirq after upgrading from 7.0.5 to 7.0.6.

864612

When the service protocol is an IP with no specific port, it is skipped to be cached and causes a protocol/port service name in the log.

865661

Standard and full ISDB sizes are not configurable on FG-101F.

872744

Packets are not matching the existing session in transparent mode.

875565

The policy or other cache lists are sometimes not freed in time. This may cause unexpected policies to be stored in the cache list.

884578

Unexpected behavior in WAD caused by enabling HTTP/2 while using virtual servers.

895962

Intermittent behavior in WAD during SSL renegotiation while using virtual servers.

897849

Firewall Policy list may show empty sequence grouping sections if multiple policies are sharing the same global-label.

912740

On a FortiGate managed by FortiManager, after upgrading to 7.4.0, the Firewall Policy list may show separate sequence grouping for each policy because the global-label is updated to be unique for each policy.

FortiGate 6000 and 7000 platforms

Bug ID

Description

838036

Merge FortiGate 6000 and 7000 series platforms.

888873

The FortiGate 7000E and 7000F platforms do not support GTP and PFCP load balancing.

902545

Unable to select a management interface LAG to be the direct SLBC logging interface.

905692

On a FortiGate 6000 or 7000, the active worker count returned by the output of diagnose sys ha dump-by group can be incorrect after an FPC or FPM goes down.

905788

Unable to select a management interface LAG to be the FGSP session synchronization interface.

FortiView

Bug ID

Description

838652

The FortiView Sessions monitor displays VDOM sessions from other VDOMs.

892798

Memory and CPU usage issues caused by malformed method header while using virtual servers.

GUI

Bug ID

Description

440197

On the System > FortiGuard page, the override FortiGuard server for AntiVirus & IPS Updates shows an Unknown status, even if the server is working correctly. This is a display issue only; the override feature is working properly.

677806

On the Network > Interfaces page when VDOM mode is enabled, the Global view incorrectly shows the status of IPsec tunnel interfaces from non-management VDOMs as up. The VDOM view shows the correct status.

699508

When an administrator ends a session by closing the browser, the administrator timeout event is not logged until the next time the administrator logs in.

722358

When a FortiGate local administrator is assigned to more than two VDOMs and tries logging in to the GUI console, they get a command parse error when entering VDOM configuration mode.

753328

Incorrect shortcut name shown on the Network > SD-WAN > Performance SLAs page.

807197

High iowait CPU usage and memory consumption issues caused by report runner.

820909

On the Policy & Objects > Schedules page, when the end date of a one-time schedule is set to the 31st of a month, it gets reset to the 1st of the same month.

Workaround: use CLI to set schedules with an end date of 31st.

821030

Security Fabric root FortiGate is unable to resolve firewall object conflicts in the GUI.

821734

Log & Report > Forward Traffic logs do not show the Policy ID if there is no Policy Name.

822991

On the Log & Report > Forward Traffic page, using the filter Result : Deny(all) does not work as expected.

827893

Security rating test for FortiCare Support fails when connected to FortiManager Cloud or FortiAnalyzer Cloud.

829736

Incorrect information is being displayed for the HA role on the System > HA page.

829773

Unable to load the Network > SD-WAN > SD-WAN Rules table sometimes due to a JavaScript error.

831439

On the WiFi & Switch Controller > SSIDs page, multiple DHCP servers for the same range can be configured on an interface if the interface name contains a comma (,) character.

837048

Unable to delete the LAN interface's addresses without switching it back to a none-LAN role.

842079

On the System > HA page, a Failed to retrieve info caution message appears when hovering over the secondary unit's Hostname. The same issue is observed on the Dashboard > Status > Security Fabric widget.

845513

On G-model profiles, changing the platform mode change from single 5G (dedicated scan enabled) to dual 5G is not taking effect.

853414

Policy and dashboard widgets do not load when the FortiGate manages a FortiSwitch with tenant ports (exported from root to other VDOM).

854529

The local standalone mode in a VAP configuration is disabled when viewing or updating its settings in the GUI.

861466

The Active Administrator Sessions widget shows the incorrect interface when accessing the firewall through the GUI.

862474

IPsec tunnel interface Bandwidth widget inbound is zero and outbound value is lower than the binding interface.

865956

On the Network > Policy Routes page, entries cannot be copied and pasted above or below.

866790

System > Firmware & Registration menu is not visible for administrator accounts without read-write permissions for the sysgrp-permission category.

867802

GUI always displays Access denied error after logging in.

869138

Unable to select addresses in FortiView monitors.

869828

An httpsd crash occurs when the GUI fails to get the disk log settings from the FortiGate.

870675

CLI console in GUI reports Connection lost. when the administrator has more than 100 VDOMs assigned.

874502

An access privilege prompt is not displayed when logging in to the GUI of a FortiGate managed by a FortiManager with post-login-banner enabled. The user is logged in with read-only permissions.

881678

On the Network > Routing Objects page, editing a prefix list with a large number of rule entries fails with an error notification that The integer value is not within valid range.

889647

CLI console disconnects and has '/tmp/daemon_debug/node_...' crash.

890531

Node.JS boots earlier than autod, which leads to a Node.JS crash.

890683

GUI being exposed to port 80 on the interfaces defined in the ACME settings, even if administrative access is disabled on the interface.

891895

When remotely accessing the FortiGate from FortiGate Cloud, the web GUI console displays Connection lost. Press Enter to start a new session.

897004

On rare occasions, the GUI may display blank pages when the user navigates from one menu to another if there is a managed FortiSwitch present.

898386

Browser returns a blank page after logging in to the GUI with an IPv6 address.

HA

Bug ID

Description

662978

Long lasting sessions are expired on HA secondary device with a 10G interface.

795443

The execute reboot script does not work in HA due to a HA failover before the script running is done.

826790

DHCP over IPsec is not working in an FGSP cluster.

843837

HA A-P virtual cluster information is not correctly presented in the GUI and CLI.

852308

New factory reset box failed to synchronize with primary, which was upgraded from 7.0.

853900

The administrator password-expire calculation on the primary and secondary returns a one-second diff, and causes HA to be out-of-sync.

854445

When adding or removing an HA monitor interface, the link failure value is not updated.

855841

In an HA A-P environment, an old administrator user still exists in the system after restoring the backup.

856004

Telnet connection running ping fails during FGSP failover for virtual wire pair with VLAN traffic.

856643

FG-500E interface stops sending IPv6 RAs after upgrading from 7.0.5 to 7.0.7.

859242

Unable to synchronize IPsec SA between FGCP members after upgrading.

860497

Output of diagnose sys ntp status is misleading when run on a secondary cluster member.

864226

FG-2600F kernel panic occurs after a failover on both members of the cluster.

868622

The session is not synchronized after HA failover by detecting monitored interface as down.

869557

Upgrading or re-uploading an image to the HA secondary node causes the OS to be un-certified.

870367

FGCP A-P devices get out of HA synchronization periodically due to FortiTokens being added and deleted.

872431

Primary FortiGate synchronizes the changing HA command to the secondary.

874823

FGSP session-sync-dev ports do not use L2 Ethernet frames but always use UDP, which reduces the performance.

876178

hasync crashing with signal 6 after upgrading to 7.2.3 from 7.0.7.

878173

When downloading the speed test server list, the HA cluster gets and stays out-of-sync.

885245

Unexpected failover occurs due to uptime, even if the uptime difference is less than the ha-uptime-diff-margin.

885844

HA shows as being out-of-sync after upgrading due to a checksum mismatch for endpoint-control fctems.

Hyperscale

Bug ID

Description

804742

After changing hyperscale firewall policies, it may take longer than expected for the policy changes to be applied to traffic. The delay occurs because the hyperscale firewall policy engine enhancements added to FortiOS may cause the FortiGate to take extra time to compile firewall policy changes and generate a new policy set that can be applied to traffic by NP7 processors. The delay is affected by hyperscale policy set complexity, the total number of established sessions to be re-evaluated, and the rate of receiving new sessions.

807523

On NP7 platforms the config system npu option for nat46-force-ipv4-packet-forwarding is missing.

810366

Unrelated background traffic gets impacted when changing a policy where a hyperscale license is used.

824733

IPv6 traffic continues to pass through a multi-VDOM setup, even when the static route is deleted.

832924

Timeouts occur when accessing the Migros Bank e-banking application and https://www.gs***.ch/ when the session is offloaded.

835697

Interface routes under DHCP mode remain in LPMD after moving the interface to another VDOM.

837270

Allowing intra-zone traffic is now supported in hyperscale firewall VDOMs. Options to block or allow intra-zone traffic are available in the GUI and CLI.

841712

On FortiGates licensed for hyperscale firewall features, the config system setting options nat46-force-ipv4-packet-forwarding and nat64-force-ipv6-packet-forwarding now also apply to NP7-offloaded traffic. The config system npu option nat46-force-ipv4-packet-forwarding has been removed.

877696

Get KTRIE invalid node related error and kernel panic on standby after adding a second device into A-P mode HA cluster.

Intrusion Prevention

Bug ID

Description

810783

The number of IPS sessions is higher than kernel sessions, which causes the FortiGate to enter conserve mode.

839170

Improvements to IPS engine monitor to resolve an error condition during periods of heavy traffic loads.

842073

Improvements to IPS engine to optimize CPU usage when a decrypted traffic mirror profile is applied to policies in flow mode.

856837

Improvements to IPS engine to optimize memory usage when flow mode antivirus is applied.

883600

Under config ips global, configuring set exclude-signatures none does not save to backup configuration.

886685

IPS daemon usage issue when notifying device vulnerability information to WAD.

IPsec VPN

Bug ID

Description

699973

IPsec aggregate shows down status on Interfaces, Firewall Policy, and Static Routes configuration pages.

726326, 745331

IPsec server with NP offloading drops packets with an invalid SPI during rekey.

788751

IPsec VPN Interface shows incorrect TX/RX counter.

797342

Users cannot define an MTU value for the aggregate VPN.

798045

FortiGate is unable to install SA (failed to add SA, error 22) when there is an overlap in configured selectors.

810833

IPsec static router gateway IP is set to the gateway of the tunnel interface when it is not specified.

812229

ASCII-encoded byte code of remote gateway IP is displayed in the GUI and CLI when a VPN tunnel is formed using IKEv1 or v2 if the peer-id is not configured.

828933

iked signal 11 crash occurs once when running a VPN test script.

842571

If mode-cfg is used, a race condition can result in an IP conflict and sporadic routing problems in an ADVPN/SD-WAN network. Connectivity can only be restored by manually flushing the IPsec tunnels on affected spokes.

848014

ESP tunnel traffic hopping from VRF.

849515

ADVPN dynamic tunnel is picking a tunnel ID that is within another VPN interface IP range.

852868

Issues with synchronization of the route information (using add-route option) on spokes during HA failover that connect to dialup VPN.

855705

NAT detection in shortcut tunnel sometimes goes wrong.

855772

FortiGate IPsec tunnel role could be incorrect after rebooting or upgrading, and causes negotiation to be stuck when it comes up.

858681

When upgrading from 6.4.9 to 7.0.6 or 7.0.8, the traffic is not working between the spokes on the ADVPN environment.

858697

Native IPsec iOS authentication failure using LDAP account with two-factor authentication.

858715

IPsec phase 2 fails when both HA cluster members reboot at the same time.

861195

In IPsec VPN, the fnbamd process crashes when the password and one-time password are entered in the same Password field of the VPN client.

869166

IPsec tunnel does not coming up after the upgrading firmware on the branch FortiGate (FG-61E).

873097

Phase 2 not initiating the rekey at soft limit timeout on new kernel platforms.

876795

RADIUS server will reject new authentication if a previous session is missing ACCT-STOP to terminate the session, which causes the VPN connection to fail.

882483

ADVPN spoke does not delete the BGP route entry to another spoke over IPsec when the IPsec VPN tunnel is down.

885818

If a tunnel in an IPsec aggregate is down but its DPD link is on, the IPsec aggregate interface may still forward traffic to a down tunnel causing traffic to drop.

887800

In an L2TP configuration, set enforce-ipsec enable is not working as expected after upgrading.

891462

The Peer ID field in the IPsec widget should not show a warning message that Two-factor authentication is not enabled.

892699

In an HA cluster, static routes via the IPsec tunnel interface are not inactive in the routing table when the tunnel is down.

899822

IPsec dialup tunnel interface does not appear in the Interface dropdown of a Dashboard > Status > Interface Bandwidth widget.

916260

The IPsec VPN tunnel list can take more than 10 seconds to load if the FortiGate has large number of site-to-site tunnels. This is a GUI display issue and does not impact tunnel operation.

Log & Report

Bug ID

Description

755632

Unable to view or download generated reports in the GUI if the report layout is custom.

795272

Local out DNS traffic is generating forward traffic logs with srcintf "unknown-0".

823183

FortiGates are showing Logs Queued in the GUI after a FortiAnalyzer reboot, even tough the queued logs were actually all uploaded to FortiAnalyzer and cleared when the connection restores.

825318

Archived Data tab is missing from intrusion prevention and application control log Details pane once log-packet is enabled.

828211

Policy ID filter is not working as expected.

829862

On the Log & Report > ZTNA Traffic page, the client's Device ID is shown as [object Object]. The Log Details pane show the correct ID information.

836846

Packet captured by firewall policy cannot be downloaded.

838357

A deny policy with log traffic disabled is generating logs.

839601

When log pages are scrolled down, no logs are displayed after 500 lines of logs.

850519

Log & Report > Forward Traffic logs do not return matching results when filtered with !<application name>.

857573

Log filter with negation of destination IP display all logs.

858304

When FortiGate Cloud logging is enabled, the option to display 7 days of logs is not visible on the Dashboard > FortiView pages.

858589

Unable to download more than 500 logs from the FortiGate GUI.

860141

Syslog did not update the time after daylight saving time (DST) adjustment.

860264

The miglogd process may send empty logs to other logging devices.

860459

Unable to back up logs (FG-201E).

860487

Incorrect time and time zone appear in the forward traffic log when timezone is set to 18 (GMT-3 Brasilia).

861567

In A-P mode, when the link monitor fails, the event log displays a description of ha state is changed from 0 to 1.

864219

A miglogd crash occurs when creating a dynamic interface cache on an ADVPN environment.

872181

On the Log & Report > Log Settings > Local Logs page, the Local reports and Historical FortiView settings cannot be enabled.

872326

FortiGate cannot retrieve logs from FortiAnalyzer Cloud. Results are shown rarely.

873987

High memory usage from miglogd processes even without traffic.

879228

FortiAnalyzer override settings are not taking effect when ha-direct is enabled.

906888

Free-style filter not working as defined under config fortianalyzer override-filter.

918571

The log_se process resource utilization is causing a network outage.

Proxy

Bug ID

Description

707827

The video filter does not display the proper replacement message when the user redirects to a blocked video from the YouTube homepage or video recommendation list.

746587

Error condition in WAD occurs during traffic scans in proxy mode.

766158

Video filter FortiGuard category takes precedence over allowed channel ID exception in the same category.

781613

Intermittent traffic disruption caused by race condition in WAD.

796150, 857507

When a server sends a connection close response too early, traffic from the client may be interrupted inadvertently before the request is completed.

818371

An error condition occurs in WAD while parsing certain URIs.

823078

Improvements to WAD to optimize CPU usage when using user groups.

825977

An error condition occurs in WAD during an AV scan submission.

834387

In a firewall proxy policy, the SD-WAN zone assigned to interface is not checked.

835745

An error condition occurs in WAD when the srcintf of a firewall proxy-policy is set to an SD-WAN zone.

853864

FortiGate out-of-band certificate check issue occurs in a proxy mode policy with SSL inspection.

854511

Unable to make API calls using Postman Runtime script after upgrading to 7.2.0.

855853

Improvements to WAD to optimize CPU usage when using user groups.

855882

Improvements to WAD to resolve a memory usage issue when user-info updates the FortiAP information.

856235

The WAD process memory usage gradually increases over a few days, causing the FortiGate to enter into conserve mode.

857368

An encoded HTTP header may be improperly handled, causing inadvertent disruption to traffic.

858148

Memory usage issue caused by the WAD user-info history daemon.

870151

Memory usage issue occurs on the WAD worker in a specific scenario.

870554

An error condition occurs in WAD when the dstaddr6 of a firewall proxy-policy is set to an IPv6 address.

874563

User information attributes can cause disruption when they are not properly merged.

880712

An error condition occurs in WAD due to an improper NULL check.

885674

Unable to send logs from FortiClient to FortiAnalyzer when deep inspection is enabled on firewall policy.

886284

An error condition occurs in WAD when a task is queued in the dev-vuln daemon and the user-info daemon restarts.

REST API

Bug ID

Description

847526

Able to add incomplete policies with empty mandatory fields using the REST API.

849273

/api/v2/monitor/system/certificate/download can still download already deleted CSR files.

864393

High CPU usage of httpsd on FG-3600E HA system.

886012

The MTU value on an interface cannot be set using the interface REST API.

892237

Updating the HA monitor interface using the REST API PUT request fails and returns a -37 error.

Remote Access

Bug ID

Description

837391

FortiClient does not send the public IP address for SAML, resulting in 0.0.0.0 being shown in FortiOS and SASE.

Routing

Bug ID

Description

708904

No IGMP-IF for ifindex log points to multicast enabled interface.

724468

Router policy destination address not take effect when internet-service-id is configured.

821149

Early packet drop occurs when running UTM traffic on virtual switch interface.

827565

Using set load-balance-mode weight-based in SD-WAN implicit rule does not take effect occasionally.

846107

IPv6 VRRP backup is sending RA, which causes routing issues.

848310

IPsec traffic sourced from a loopback interface does not follow the policy route or SD-WAN rules.

850778

Spoke-to-spoke communication randomly breaks. The BGP route to reach the spoke subnet points to the main ADVPN tunnel instead of the shortcut tunnel.

850862

When creating a new rule on the Network > Routing Objects page, the user cannot create a route map with a rule that has multiple similar or different AS paths in the GUI.

856462

When there are multiple routes in the link monitor, they are not withdrawn from the routing table when the link monitor is not functioning as expected.

860075

Traffic session is processed by a different SD-WAN rule and randomly times out.

862165

FortiGate does not add the route in the routing table when it changes for SD-WAN members.

862418

Application VWL crash occurs after FortiManager configuration push causes an SD-WAN related outage.

862573

SD-WAN GUI does not load, and the lnkmtd process crashes frequently.

863318

Application forticron signal 11 (Segmentation fault) received.

865914

When BSM carries multiple CRPs, PIM might use the incorrect prefix to update the mroute's RP information.

870983

Unable to set local-as in BGP confederation configuration.

883918

Delay in joining (S,G) in PIM-SM.

884372

All BGP routes in dual ADVPN redundant configuration are not getting updated to the correct WAN interface post-rollback to WAN failover.

890379

After upgrading, SD-WAN is unable to fail over the traffic when one interface is down.

893603

GUI does not show gateway IP on the routing table page if VDOM mode is transparent.

897940

Link monitor's probe timeout value range is not appropriate when the user decreases the minimum interval.

Security Fabric

Bug ID

Description

753177

IoT device vulnerabilities should be included in security ratings.

809106

Security Fabric widget and Fabric Connectors page do not identify FortiGates properly in HA.

814796

The threat level threshold in the compromised host trigger does not work.

819192

After adding a Fabric device widget, the device widget does not appear in the dashboard.

825291

Security rating test for FortiAnalyzer fails when connected to FortiAnalyzer Cloud.

832015

Root FortiGate cannot finish the security rating with a large Fabric topology (more than 25 to 30 devices) because the REST API is not limited to the local network.

841364

Cisco APIC SDN update times out on large datasets.

844412

When a custom LLDP profile has auto-isl disabled, the security rating test, Lockdown LLDP Profile, fails.

848822

The FortiAP Firmware Versions and FortiSwitch Firmware Versions security rating tests fail because the firmware version on the FortiAPs and FortiSwitches is not recognized correctly.

851656

Sessions with csf_syncd_log flag in a Security Fabric are not logged.

852340

Various places in the GUI do not show the secondary HA device.

862424

On a FortiGate that has large tables (over 1000 firewall policies, address, or other tables), security rating reports may cause the FortiGate to go into conserve mode.

862532

Unable to load topology pages for a specific Security Fabric topology on the root and downstream FortiGates.

867313

Error triggering automation stitch message appears when the license expiry notification type is FortiGuard Web Filter.

868701

In a simple cluster, the primary unit failed to upgrade to 7.2.3.

870527

FortiGate cannot display more than 500 VMs in a GCP dynamic address.

875100

Unable to remove external resource in a certain VDOM when the external resource has no reference in that VDOM.

880011

When the Security Fabric is enabled and admin-https-redirection is enabled on a downstream FortiGate, the following GUI features do not work for the downstream FortiGate when the administrator manages the downstream FortiGate using the root FortiGate's GUI:

  • Web console access
  • Diagnostic packet capture
  • GUI notification when a new device joins or leaves the Security Fabric
  • GUI notification if a configuration on the current page changes

These features still work for the root FortiGate's GUI.

885810

The gcpd daemon constantly crashes (signal 11 segmentation fault).

887967

Fabric crashes when synchronizing objects with names longer than 64 characters.

907172

Automation stitch with FortiDeceptor Fabric connector event trigger cannot be triggered.

SSL VPN

Bug ID

Description

710657

The dstaddr/dstaddr6 of an SSL VPN policy can be set to all when split tunnel mode is enabled and only the default portal is set.

719740

The No SSL-VPN policies exist warning is displayed when an SSL VPN zone having an SSL VPN tunnel interface is used in a policy. The warning can be ignored; it does not affect the SSL VPN functionality.

746440

When sending the SSL VPN settings email (VPN > SSL-VPN Settings > Send SSL-VPN Configuration), the Email template only includes a hyperlink to the configuration, which is not supported by Gmail and Fortinet email.

748085

Authentication request of SSL VPN realm can now only be sent to user group, local user, and remote group that is mapped to that realm in the SSL VPN settings. The authentication request will not be applied to the user group and remote group of non-realm or other realms.

787768

The web-mode setting should not be enabled when the portal is mapped in an SSL VPN policy where a VIP is applied.

808107

FortiGate is not sending Accounting-Request packet that contains the Interim-Update AVP when two-factor authentication is assigned to a user (defined on the FortiGate) while connecting using SSL VPN.

810239

Unable to view PDF files in SSL VPN web mode.

819754

Multiple DNS suffixes cannot be set for the SSL VPN portal.

828194

SSL VPN stops passing traffic after some time.

839261

On the VPN > SSL-VPN Settings page, when the source-address-negate option is enabled for an address in the CLI, the GUI does not display an exclamation mark against that address entry in the Hosts field.

This is cosmetic and does not affect on the FortiGate functionality or operation. The source-address-negate option being enabled can be confirmed in the CLI.

850898

OS checklist for the SSL VPN in FortiOS does not include macOS Ventura (13).

852566

User peer feature for one group to match to multiple user peers in the authentication rules is broken.

854143

Unable to access Synology NAS server through SSL VPN web mode.

854642

Internal website with JavaScript is proxying some functions in SSL VPN web mode, which breaks them.

856316

Browser displays an Error, Feature is not available message if a file larger than 1 MB is uploaded from FTP or SMB using a web bookmark, even though the file is uploaded successfully. There are no issues with downloading files.

856554

SSL VPN web mode top-right dropdown button (user profile menu) does not work.

859115

SSL VPN bookmark not accessible.

863860

RDP over SSL VPN web mode to a Windows Server changes the time zone to GMT.

864096

EcoStruxure Building Operations 2022 does not render using SSL VPN bookmark.

864417

In the second authentication of RADIUS two-factor authentication, the acct-update-interval returned is 0. SSL VPN uses the second return and not send RADIUS acct-interim-update packet.

867182

RDP/VNC host name is not encrypted when URL obscuration is enabled.

870061

Kernel does not delete original route after address assigned to the client changes.

873313

SSL VPN policy is ignored if no user or user group is set and the FSSO group is set.

873995

Problem with the internal website using SSL VPN web mode.

877896

When accessing the VDOM's GUI in SSL VPN web mode, policies are only shown for a specific VDOM instead of all VDOMs.

884860

SSL VPN tunnel mode gets disconnected when SSL VPN web mode is disconnected by limit-user-logins.

890876

One of the speed-connect website JavaScript files has trouble with host process.

Switch Controller

Bug ID

Description

730472

FortiSwitch enabled VLANs with VLAN and proxy ARP access have large latencies on initial ARP resolutions.

762615, 765283

FortiSwitches managed by FortiGate go offline intermittently and require a FortiGate reboot to recover.

769722

Support FortiLink to recognize a FortiSwitch based on its name and not just by serial number.

853718

Layer 3 FortiLink does not come up after upgrading.

854104

FortiLink daemon keeps pushing the configuration to FortiSwitch for a long time when the FortiSwitch is deleted and re-discovered.

857778

Switch controller managed switch port configuration changes do not take effect on the FortiSwitch.

858113

On the WiFi & Switch Controller > Managed FortiSwitches page, when an administrator with restricted access permissions is logged in, the Diagnostics and Tools page for a FortiSwitch cannot be accessed.

876021

FortiLink virtually managed switch port status is not getting pushed after the FortiGate reboots.

886887

When a MAC VLAN appears on the same MCLAG trunk, continuous event logs are received on FortiGate and FortiAnalyzer.

System

Bug ID

Description

550701

Inadvertent traffic disruption caused by WAD due to deadlock.

649729

HA synchronization packets are hashed to a single queue when sync-packet-balance is enabled.

666664

Interface belonging to other VDOMs should be removed from interface list when configuring a GENEVE interface.

700621

The forticron daemon is constantly being restarted.

709679

Get can not set mac address(16) error message when setting a MAC address on an interface in HA that is already set.

713951

Not all ports are coming up after an LAG bounce on 8 × 10 GB LAG with ASR9K. Affected platforms: FG-3960E and FG-3980E.

722273

SA is freed while its timer is still pending, which leads to a kernel crash.

724085

Traffic passing through an EMAC VLAN interface when the parent interface is in another VDOM is blocked if NP7 offloading is enabled.

729912

DNS proxy does not transfer the DNS query for IPv6 neighbor discovery (ND) when client devices are using random MAC addresses, so one device can configure many IPv6 addresses.

748496

Wrong IP displayed in GUI widget if FortiGuard anycast AWS is used.

776646

On the Network > Interfaces page, configuring a delegated interface to obtain the IPv6 prefix from an upstream DHCPv6 server fails with an error notification (CLI internal error).

784169

When a virtual switch member port is set to be an alternate by STP, it should not reply with ARP; otherwise, the connected device will learn the MAC address from the alternate port and send subsequent packets to the alternate port.

790595

Improve dnsproxy process memory management.

799570

High memory usage occurs on FG-200F.

805122

In FIPS-CC mode, if cfg-save is set to revert, the system will halt a configuration change or certificate purge.

807629

NP7 dos-offload triggers an established TCP session to have synproxy process issues.

810137

Scheduled speed test crash is caused by adding the same object to a list twice.

810879

DoS policy ID cannot be moved in GUI and CLI when multiple DoS policies are enabled.

812957

When setting the speed of 1G SFP ports on FG-180xF platforms to 1000full, the interface does not come up after rebooting.

813607

LACP interfaces are flapping after upgrading.

815937

FCLF8522P2BTLFTN transceiver is not working after upgrade.

818897

The value of SNMP OID IP-MIB (RFC 4293) is inaccurate.

820268

VIP traffic access to the EMAC VLAN interface uses incorrect MAC address on NP7 platform.

826490

NP7 platforms may reboot unexpectedly when unable to handle kernel null pointer dereference.

827240

FortiGate may not provide detailed information during a watchdog-initiated reboot.

828129

A disabled EMAC VLAN interface is replying to a ping.

836409

When deleting a non-existing entry, the error code returned is not appropriate.

838933

DoS anomaly has incorrect threshold after loading a modified configuration file.

840960

When kernel debug level is set to >=KERN_INFO on NP6xLite platforms, some tuples missing debug messages may get flooded and cause the system to get stuck.

845736

After rebooting the FortiGate, the MTU value on the VXLAN interface was changed.

847314

NP7 platforms may encounter random kernel crash after reboot or factory reset.

850683

Console keeps displaying bcm_nl.nr_request_drop ... after the FortiGate reboots because of the cfg-save revert setting under config system global. Affected platforms: FG-10xF and FG-20xF.

850688

FG-20xF system halts if setting cfg-save to revert under config system global and after the cfg-revert-timeout occurs.

852562

Huge configuration files cause delays during the booting process.

853144

Network device kernel null pointer is causing a kernel crash.

853794

Issue with the server_host_key_algorithm compatibility when using SSH on SolarWinds.

853811

Fortinet 10 GB transceiver LACP flapping when shut/no shut was performed on the interface from the switch side.

854388

Configuring set src-check disable is not persistent in the kernel after rebooting for GRE interfaces.

855573

False alarm of the PSU2 occurs with only one installed.

855775

Time zone for Kyiv, Ukraine is missing.

856202

Random reboots and kernel panic on NP7 cluster when the FortiGate sends a TCP RST packet and IP options are missing in the header.

859717

The FortiGate is only offering the ssh-ed25519 algorithm for an SSH connection.

859795

High CPU utilization occurs when relay is enabled on VLAN, and this prevents users from getting an IP from DHCP.

860052

The 40G/100G port goes down on FG-260xF when upgrading to 7.2.

860385

IPv6 BGP session drops when passing through a FortiGate configured with VRF.

862941

GUI displays a blank page if vdom-admin user has partial permissions.

867428

Add check to skip invalid names when creating a VDOM.

867435

FG-400E-BP has crash at initXXXXXXXXXXX[1]: segfault at 3845d5a after package validation fails.

867978

Subnet overlap error occurs when configuring the same IPv4 link-local addresses on two different interfaces.

868225

After a cold reboot (such as a power outage), traffic interfaces may not come up with a possible loss of VLAN configurations.

868821

execute ssh-regen-keys should be global-level command.

869599

Forticron memory is leaking.

870381

Memory corruption or incorrect memory access when processing a bad WQE.

872391

The session output of dia sys npu-session list shows wrong duration when the session is very long (+40 hours).

875868

HQIP test fails on FG-2201E.

876403

ACME auto-renewal is not performed after HA failover.

876853

No output of execute sensor list is displayed after rebooting.

876874

The Dashboard > Status > Sensor Information widget does not load.

877039

On the Network > BGP page, creating or editing a table entry increases memory consumption of the FortiGate to 99%.

877154

FortiGate with new kernel crashes when starting debug flow.

877240

Get zip conf file failed -1 error message when running a script configuring the FortiGate.

878400

When traffic is offloaded to an NP7 source MAC, the packets sent from the EMAC VLAN interface are not correct.

880290

NP7 is not configured properly when the ULL ports are added to LAG interface, which causes accounting on the LAG to not work.

881094

FG-3501F NP7 is dropping all traffic after it is offloaded.

883071

Kernel panic occurs due to null pointer dereference.

887772

CPU usage issue in WAD caused by checking authentication group member information.

889634

Unable to configure IPv6 setting on system interface (FWF-81F-2R-POE).

891841

Unable to handle kernel NULL pointer dereference at 0000000000000000 for NP7 device; the device keeps rebooting.

894045

Sensor information widget continuously loading.

899884

FG-3000F reboots unexpectedly with NULL pointer dereference.

909345

An error condition occurs caused by receiving ICMP redirect messages.

Upgrade

Bug ID

Description

850691

The endpoint-control fctems entry 0 is added after upgrading from 6.4 to 7.0.8 when the FortiGate does not have EMS server, which means the endpoint-control fctems feature was not enabled previously. This leads to a FortiManager installation failure.

892647

Static route configurations were lost upgrading from 7.0.7 to 7.2.3.

900761

FG-601E crashes randomly after upgrading to 7.0.8 and 7.0.11.

903113

Upgrading FortiOS firmware with a local file from 6.2.13, 6.4.12, 7.0.11, or 7.2.4 and earlier may fail for certain models because the image file size exceeds the upload limit. Affected models: FortiGate 6000 and 7000 series, FWF-80F-2R, and FWF-81F-2R-POE.

User & Authentication

Bug ID

Description

751763

When MAC-based authentication is enabled, multiple RADIUS authentication requests may be sent at the same time. This results in duplicate sessions for the same device.

823884

When a search is performed on a user (User & Authentication > User Definition page), the search results highlight all the groups the user belongs to.

837185

Automatic certificate name generation is the same for global and VDOM remote certificates, which can cause certificates to exist with the same name.

843528

RADIUS MAC authentication using ClearPass is intermittently using old credentials.

846545

LDAPS connectivity test fails with old WinAD after OpenSSL was upgraded to 3.0.2.

853793

FG-81F 802.1X MAC authentication bypass (MAB) failed to authenticate Cisco AP.

855898

All devices are detected as Other identified device in the Device Inventory widget.

856370

The EAP proxy worker application crashes frequently.

857438

SSL VPN group matching does not work as expected for Azure auto login.

858961

Client's firewall authentication session timeout is set to 900 when it passes MAC authentication bypass by ping.

859845

In some cases, the proper hostnames are not showing up when looking at APs on the FortiSwitch ports screen.

864703

ACME client fails to work with some CA servers.

865166

A cid scan crash occurs when device detections happen in a certain order.

867225

ARP does not trigger FortiGuard device identification query.

VM

Bug ID

Description

740796

IPv6 traffic triggers <interface>: hw csum failure message on CLI console.

856645

Session is not crated over NSX imported object when traffic starts to flow.

859165

Unable to enable FIPS cipher mode on FG-VM-ARM64-AWS.

859589

VPNs over Oracle Cloud stop processing traffic.

860096

CPU spike observed on all the cores in a GCP firewall VM.

868698

During a same zone AWS HA failover, moving the secondary IP will cause the EIP to be in a disassociated state.

869359

Azure auto-scale HA shows certificate error for secondary VM.

878074

FG-ARM64-GCP and FG-ARM64-AZURE have HA synchronization issue with internal IP after failover.

881728

Kernel hangs on FG-VM64-AZURE.

883203

FG-AWS SDN is unable to retrieve EKS cluster information, even thought its role is trusted by the EKS role.

883896

Backup virtual server not working as expected (ERR_EMPTY_RESPONSE).

885829

Azure SDN connector stopped processing when Azure returned NotFound error for VMSS interface from an AD DS-managed subscription.

890278

FG‑VM Rackspace On-Demand upgrade from 7.2.3 to 7.2.4 breaks the pay-as-you-go license, and reverts it to an evaluation license.

902816

An error condition occurs after a failover on the HA cluster deployed on an FG-VM64-AZURE.

912184

An error condition is observed after deploying an FG-VM64-AZURE in Standard_DS4_v2 size.

VoIP

Bug ID

Description

757477

PRACK will cause voipd crashes when the following conditions are met: block-unknown is disabled in the SIP profile, the PRACK message contains SDP, and PRACK fails to find any related previous transactions (this is not a usual case).

Web Filter

Bug ID

Description

766126

Block replacement page is not pushed automatically to replace the video content when using a video filter.

807277

Video filter function does not block YouTube stream after accessing some allowed channels.

856793

In flow mode, URL filter configuration changes cause a spike in CPU usage of the IPS engine process.

863728

The urlfilter process causes a memory leak, even when the firewall policy is not using the web filter feature.

878442

FortiGuard block page image (logo) is missing when the Fortinet-Other ISDB is used.

WiFi Controller

Bug ID

Description

807605

FortiOS exhibits segmentation fault on hostapd on the secondary controller configured in HA.

821320

FG-1800F drops wireless client traffic in L2 tunneled VLAN with capwap-offload enabled.

825182

The 6 GHz channel lists should be updated according to the latest WiFi country region channels map.

828901

Connectivity loss occurs due to switch and FortiAPs (hostapd crash).

831736

Application hostapd crash found on FG-101F.

834644

A hostapd process crash is shown in device crash logs.

835783

CAPWAP traffic is not offloaded when re-enabling capwap-offload.

837130

Wireless client shows portal related webpage while doing MAC authentication with MAB mode.

846730

Dynamic VLAN assignment is disabled in the GUI when editing an SSID with radius mac-auth and dynamic-vlan enabled.

856038

The voice-enterprise value changed after upgrading.

856830

HA FortiGate encounters multiple hostapd crashes.

857084

Hostapd segmentation fault signal 6 occurs upon HA failover.

857140

Hostapd segmentation fault signal 11 occurs upon RF chamber setup.

857975

The cw_acd process appears to be stuck, and is sending several access requests for MAC authentication.

858653

Invalid wireless MAC OUI detected for a valid client on the network.

861552

Wireless client gets disconnect from WiFi if it is connected to a WPA2 SSID more than 12 hours.

865260

Incorrect source IP used in the self-originating traffic to RADIUS server.

868022

Wi-Fi clients on a RADIUS MAC MPSK SSID get prematurely de-authenticated by the secondary FortiGate in the HA cluster.

874997

Fetching the registration status does not always work.

882551

FortiWiFi fails to act as the root mesh AP, and leaf AP does not come online.

891625

Quarantined STA connected to a long interface name VAP is not moved to quarantined VLAN 4093.

892575

MPSK SSID with mpsk-schedules stopped working after the system time was changed due to daylight saving time.

ZTNA

Bug ID

Description

832508

The EMS tag name (defined in the EMS server's Zero Trust Tagging Rules) format changed in 7.2.1 from FCTEMS<serial_number>_<tag_name> to EMS<id>_ZTNA_<tag_name>.

After upgrading from 7.2.0 to 7.2.1, the EMS tag format was converted properly in the CLI configuration, but the WAD daemon is unable to recognize this new format, so the ZTNA traffic will not match any ZTNA policies with EMS tag name checking enabled.

859421

ZTNA server (access proxy VIP) is causing all interfaces that receive ARP request to reply with their MAC address.

863057

ZTNA real server address group gets unset once the FortiGate restarts.

865316

Adding an EMS tag on the Policy & Objects > Firewall Policy edit page for a normal firewall policy forces NAT to be enabled.

875589

An error case occurs in WAD when a client EMS tag changes.

887307

CPU usage issue in WAD caused by checking authentication group member information.

Common Vulnerabilities and Exposures

Visit https://fortiguard.com/psirt for more information.

Bug ID

CVE references

843318

FortiOS 7.2.5 is no longer vulnerable to the following CVE Reference:

  • CVE-2023-41675

854906

FortiOS 7.2.5 is no longer vulnerable to the following CVE Reference:

  • CVE-2022-45862

860282

FortiOS 7.2.5 is no longer vulnerable to the following CVE Reference:

  • CVE-2023-33307

875854

FortiOS 7.2.5 is no longer vulnerable to the following CVE Reference:

  • CVE-2023-28001

887734

FortiOS 7.2.5 is no longer vulnerable to the following CVE Reference:

  • CVE-2023-33306

892978

FortiOS 7.2.5 is no longer vulnerable to the following CVE Reference:

  • CVE-2023-33301

894168

FortiOS 7.2.5 is no longer vulnerable to the following CVE Reference:

  • CVE-2023-29183

894631

FortiOS 7.2.5 is no longer vulnerable to the following CVE Reference:

  • CVE-2023-29178

896403

IPS Engine 7.00314 is no longer vulnerable to the following CVE Reference:

  • CVE-2023-40718

898402

FortiOS 7.2.5 is no longer vulnerable to the following CVE Reference:

  • CVE-2023-27997

899434

FortiOS 7.2.5 is no longer vulnerable to the following CVE Reference:

  • CVE-2023-41841

918991

FortiOS 7.2.5 is no longer vulnerable to the following CVE Reference:

  • CVE-2023-36639