Known issues
The following issues have been identified in version 8.0.3. To inquire about a particular bug or report a bug, please contact Fortinet Customer Service & Support: https://support.fortinet.com.
| Bug ID | Description |
|---|---|
|
1258393 |
The GeoIP configuration is lost after upgrading to version 8.0.4. This occurs because version 8.0.3 fails to perform a mandatory automatic backup of the GeoIP database during the upgrade process. Consequently, the missing database prevents the GeoIP module from restoring its country-list settings in version 8.0.4, leading to parsing errors and empty policies. Workaround: After the GeoIP database is automatically recovered following the upgrade, you must restore the configuration from a backup file or manually reconfigure the GeoIP policies. |
|
1236503 |
FortiAI chat history export in PNG format may become unresponsive when handling large histories. With sufficiently large transcripts, exporting to PNG may cause the browser to freeze or display a long-running script warning. This issue affects only the PNG export function; all other FortiAI features operate normally. Recommendation: For long chat histories, export the transcript in HTML format, which does not experience this performance issue. |
|
1237118 |
When multiple administrators use FortiAI concurrently on the same FortiWeb appliance, FortiAI authentication tokens may intermittently become invalid. To improve service availability and distribute load, FortiAI login requests are load-balanced across multiple FortiAI service domains. However, in some concurrent multi-user scenarios, login requests may be routed to different FortiAI domains, which can overwrite the stored domain information on FortiWeb. As a result, previously issued tokens may no longer match the active FortiAI domain, causing subsequent FortiAI requests to fail. This issue occurs sporadically and only in concurrent multi-user scenarios. |
| 1225818 |
CRL files cannot be restored using the
Because large CRLs generate substantial encoded data during backup, including them can exceed CMDB capacity and lead to system instability. As a result, these commands intentionally back up and restore only certificate and key objects; the CRL store under |
|
1222520 |
When upgrading to FortiWeb 8.0.3 or 7.6.6, the system may display console messages such as: Parsing error at 'ssl-custom-cipher'. err=1 Parsing error at 'tls13-custom-cipher'. err=1 These messages occur because 8.0.3 and 7.6.6 include changes that eliminate the need for This behavior is cosmetic and does not affect SSL operation or any existing configuration. The issue appears only during this upgrade, and subsequent upgrades will not display these messages. |
|
1224275 |
SAML signature-certificate updates require a second request to take effect. When a custom Service Provider (SP) certificate is updated in the SAML configuration, the new certificate does not take effect immediately. The first SAML request after the update may still be validated using the previous certificate, and the updated certificate is applied only on the subsequent request. This behavior occurs because the underlying SAML library does not reload signature-validation state instantly after configuration changes. SAML authentication functionality is not affected; all authentication attempts succeed once the second request is sent. |