Fortinet black logo

Resolved Issues

Resolved Issues

The following issues have been fixed in FortiSandbox 4.4.3. For inquiries about a particular bug, contact Customer Service & Support.

Bug ID

Description

956066 Update the VM Settings on Android related info.

GUI

Bug ID

Description

910692 Fixed mismatched data on Scan Statistics widgets.
936514 Fixed job visibility issue on wildcard user file/URL submission with a customized full-access admin profile.
936972 Fixed scan profile page issue failing to save with a large number of archive passwords.

940654

Fixed password saving issue in Scan Profile page.

968062

Fixed dashboard error when scanned job database is too big.

973326

Fixed VM clone number update issue on the VM Settings page.

Fabric integration

Bug ID

Description

954026 Fixed stability issue of file/URL receiving module due to thousands connected fabric devices.

950288

Fixed SSH connection issue from FGT to FSA.

Scan

Bug ID

Description

786020

Fixed hot-standby logic on public cloud deployment to stop VM clones on system shutdown.

869554 Fixed file extraction issue on sniffer mode deployment for random missed samples.

923645

Fixed timeout setting for executable within a compress file.

943535 Fixed scan issue on empty file submitted via FortiMail.

952697

Fixed detection and rating issue on QR code in PDF.

964416 Fixed submissions stuck in 'in process' issue when very large number of files submitted to an HA-Cluster deployment.

968161

Fixed rating engine failure issue on password-protected file using the Cloud VMs.

968232

Fixed random failure issue on rating of the submission.

System & Security

Bug ID

Description

802644

Fixed download logic issue of the tracer and rating engines on new deployment and recent upgrades.

927842

Fixed proxy server on FortiGuard configuration to support FQDN.

935501

Fixed Web page access being allowed by api-port configuration.

939476 Fixed default setting issue on FortiGuard cloud submission of files for sharing threat intelligence.

939834

Fixed initialization issue on Ubuntu VM.

950387

Fixed SCP backup with custom port.

961448 Fixed connection issue to the FortiGuard Community Cloud if proxy with allowlist is used.

964577

Fixed proxy support on Web Filtering Query to the FortiGuard.

964653

Fixed disk usage issue on the primary node of a cluster deployment due to improper cleanup of tracer logs when specifically retrieved from worker nodes.

Logging & Reporting

Bug ID

Description

923573 Fixed wrong information on the job detailed report of password-protected compressed files submission.
947919 Fixed the error message 'Can't access VM image server' due to the default DNS timeout.
963454 Fixed scheduled report generation issue which happened randomly.
967231 Fixed log issue on FAZ when the job filename or URL is too long.

Common vulnerabilities and exposures

Bug ID

Description

966389

FortiSandbox4.4.3 is no longer vulnerable to the following CVE Reference:

  • CVE-2023-47540
967664

FortiSandbox4.4.3 is no longer vulnerable to the following CVE Reference:

  • CVE-2023-47541

Resolved Issues

The following issues have been fixed in FortiSandbox 4.4.3. For inquiries about a particular bug, contact Customer Service & Support.

Bug ID

Description

956066 Update the VM Settings on Android related info.

GUI

Bug ID

Description

910692 Fixed mismatched data on Scan Statistics widgets.
936514 Fixed job visibility issue on wildcard user file/URL submission with a customized full-access admin profile.
936972 Fixed scan profile page issue failing to save with a large number of archive passwords.

940654

Fixed password saving issue in Scan Profile page.

968062

Fixed dashboard error when scanned job database is too big.

973326

Fixed VM clone number update issue on the VM Settings page.

Fabric integration

Bug ID

Description

954026 Fixed stability issue of file/URL receiving module due to thousands connected fabric devices.

950288

Fixed SSH connection issue from FGT to FSA.

Scan

Bug ID

Description

786020

Fixed hot-standby logic on public cloud deployment to stop VM clones on system shutdown.

869554 Fixed file extraction issue on sniffer mode deployment for random missed samples.

923645

Fixed timeout setting for executable within a compress file.

943535 Fixed scan issue on empty file submitted via FortiMail.

952697

Fixed detection and rating issue on QR code in PDF.

964416 Fixed submissions stuck in 'in process' issue when very large number of files submitted to an HA-Cluster deployment.

968161

Fixed rating engine failure issue on password-protected file using the Cloud VMs.

968232

Fixed random failure issue on rating of the submission.

System & Security

Bug ID

Description

802644

Fixed download logic issue of the tracer and rating engines on new deployment and recent upgrades.

927842

Fixed proxy server on FortiGuard configuration to support FQDN.

935501

Fixed Web page access being allowed by api-port configuration.

939476 Fixed default setting issue on FortiGuard cloud submission of files for sharing threat intelligence.

939834

Fixed initialization issue on Ubuntu VM.

950387

Fixed SCP backup with custom port.

961448 Fixed connection issue to the FortiGuard Community Cloud if proxy with allowlist is used.

964577

Fixed proxy support on Web Filtering Query to the FortiGuard.

964653

Fixed disk usage issue on the primary node of a cluster deployment due to improper cleanup of tracer logs when specifically retrieved from worker nodes.

Logging & Reporting

Bug ID

Description

923573 Fixed wrong information on the job detailed report of password-protected compressed files submission.
947919 Fixed the error message 'Can't access VM image server' due to the default DNS timeout.
963454 Fixed scheduled report generation issue which happened randomly.
967231 Fixed log issue on FAZ when the job filename or URL is too long.

Common vulnerabilities and exposures

Bug ID

Description

966389

FortiSandbox4.4.3 is no longer vulnerable to the following CVE Reference:

  • CVE-2023-47540
967664

FortiSandbox4.4.3 is no longer vulnerable to the following CVE Reference:

  • CVE-2023-47541