Resolved issues
The following issues have been fixed in FortiSwitchOS 7.2.0. For inquiries about a particular bug, please contact Customer Service & Support.
| Bug ID | Description |
|---|---|
|
724558 |
A flash module failed and caused a complete network outage. |
| 724813 | The set enforce-first-as {disable | enable} command should have been placed under config neighbor and does not work in its current location (directly under config router bgp). There is no patch available for this issue. |
|
741354 |
There is a segmentation fault when a packet is received for a deleted interface before the DHCP client module has removed that interface. |
|
743749 |
When the network hub is disconnected and then reconnected, MAB sometimes does not work. |
|
746584 |
An FS-448D cannot be access on an intermittent basis. |
|
748177 |
When the network monitor is enabled, the MCLAG trunk becomes unstable. |
|
748249 |
New CLI commands have been added under the |
|
752085 |
When the FortiSwitch unit sends the BPDU with the proposal bit on, it causes STP to be unsynchronized. |
|
753630 |
MAB cannot be recovered after the daemon for 802.1x port-based authentication has crashed. |
|
754232 |
Some FS-224D-FPOE switches have problems with checking the PSU GPIO. |
|
759992 |
After the FortiSwitch unit is restarted, the memory usage increases, and users cannot access the FortiSwitch unit with the CLI or GUI. |
|
760536 |
The SNMP trap for the power supply failing or being restored is using the wrong OID. |
| 763264 | Displaying the Switch > Port > Physical page or the dashboard causes high CPU usage. |
|
763953 |
After the LDAP authentication succeeds, there is a “wrong username and password” error. |
|
769733 |
The getnext query needs to be supported for OID .0/0.0. |
|
771767 |
The switch cannot be accessed if the trusted host is not using /32. |
|
787797 |
The FortiSwitch unit does not allow VTP traffic between Cisco switches. |
|
796030 |
There is no response when SNMP polls a loopback interface. |
Common vulnerabilities and exposures
FortiSwitchOS 7.2.0 is no longer vulnerable to the following CVEs:
-
CWE-190
-
CWE-347
-
CWE-352
-
CWE-610
-
CWE-788
Visit https://fortiguard.com/psirt for more information.