Resolved issues
The following issues have been fixed in version 7.2.4. To inquire about a particular bug, please contact Customer Service & Support.
Anti Spam
Bug ID |
Description |
---|---|
857911 |
The Anti-Spam Block/Allow List Entry dialog page is not showing the proper Type values in the dropdown. |
Anti Virus
Bug ID |
Description |
---|---|
727067 |
FortiGate should fix the interface between FortiGate and FortiAnalyzer for the CDR file. |
794575 |
If FortiGate Cloud is selected as sandbox server under Security Fabric > Fabric Connectors, an anti virus profile with settings to Send files to FortiSandbox for inspection does not get saved in the GUI. |
800731 |
Flow AV sends HTML files to the FortiGate Cloud Sandbox every time when HTML is not configured in file list. |
818092 |
CDR archived files are deleted at random times and not retained. |
823677 |
When a FortiGate with DLP patterns configured is connected to FortiSandbox, scanunit crashes when the FortiSandbox extension reloads or worker shuts down. |
845960 |
Flow mode opens port 8008 over the AV profile that does not have HTTP scan enabled. |
849020 |
FortiGate may enter conserve mode while performing Content Disarm and Reconstruction (CDR) parsing on certain MS Office documents with a .tmp extension. |
Application Control
Bug ID |
Description |
---|---|
670627 |
When configuring an application group with Google Drive_File.Sharing or a category in a security policy, there is no drop or warning message. |
829458 |
Remove option to block QUIC by default. |
Data Leak Prevention
Bug ID |
Description |
---|---|
828621 |
DLP is not blocking files larger than the threshold value defined in |
872057 |
Incorrect count match when multiple DLP sensors are used in a single DLP profile leading to a false positive block of files. |
Endpoint Control
Bug ID |
Description |
---|---|
817140 |
Device is constantly unauthorized in EMS when using |
834168 |
FortiGates get deauthorized on EMS. |
Explicit Proxy
Bug ID |
Description |
---|---|
744564 |
Expand web proxy header content string size from 256 to 512, then to 1024. |
803228 |
When converting an explicit proxy session to SSL redirect, traffic may be interrupted inadvertently in some situations. |
805703 |
FortiGate does not load balance requests evenly when the |
823319 |
Authentication hard timeout is not respected for firewall users synchronized from WAD user. |
866316 |
Explicit web proxy fails to forward HTTPS request to a Squid forward server when certificate inspection is applied. |
Firewall
Bug ID |
Description |
---|---|
631814 |
Static route configuration should not be shown on address dialog page if the address type is an IP range. |
728734 |
The VIP group hit count in the table (Policy & Objects > Virtual IPs) is not reflecting the correct sum of VIP members. |
784766 |
When a FortiGate virtual server for Exchange incorrectly indicates to the Exchange server that it does not support secure renegotiation when it should, the Exchange server terminates the connection and returns an |
800730 |
When using NGFW policy-based mode, modifying a security policy causes all sessions to be reset. |
808264 |
Stress test shows packet loss when testing with flow inspection mode and application control. |
815333 |
Local-in policy does not deny IKE UDP 500/4500. |
815565 |
Unable to connect to the reserved management interface allowed by the local-in policy. |
823917 |
Packet loss occurs due to a high amount of fragment reassembly failures. |
824091 |
Promethean Screen Share (multicast) is not working on the member interfaces of a software switch. |
827397 |
When matching traffic result and no internet service is configured, lower singularity object result may overwrite higher ones. |
827780 |
ISDB source matching is inconsistent between transparent and NAT modes. |
829071 |
Geolocation block on VIP object failed with seemly correct configuration. |
829664 |
Kernel panic occurs while collecting the debug flow. |
830823 |
Traffic is dropped intermittently by the implicit deny policy, even though there is a valid policy on the FortiGate. |
832063 |
The Clone Reverse option is missing when right-clicking on an entry on some policy pages. |
832217 |
Traffic is hitting the implicit deny policy when changes are made to a policy. |
833370 |
Need ability to add external resource as source address in a local-in policy. |
834301 |
Session dropped with timeout action after policy changes. |
835413 |
Inaccurate sFlow interface data reported to PRTG after upgrading to 7.0. |
840689 |
Virtual server aborts connection when |
843274 |
Source interface filter ( |
847086 |
Unable to add additional MAC address objects in an address group that already has 152 MAC address objects. |
848058 |
NPD failed to parse zone in the source interface of a DoS/ACL policy and failed to offload. |
852714 |
Making a full HTTP session is sometimes bypassed if |
854107 |
NGFW VDOM incorrectly includes all interfaces belonging to the root VDOM on interface and policy related GUI pages. |
865661 |
Standard and full ISDB sizes are not configurable on FG-101F. |
FortiView
Bug ID |
Description |
---|---|
798427 |
Change the sandbox PDF report query to be on-demand. |
838652 |
The FortiView Sessions monitor displays VDOM sessions from other VDOMs. |
GUI
Bug ID |
Description |
---|---|
440197 |
On the System > FortiGuard page, the override FortiGuard server for AntiVirus & IPS Updates shows an Unknown status, even if the server is working correctly. This is a display issue only; the override feature is working properly. |
712414 |
On the System > Fabric Management page, the registration status for FortiSwitches and FortiAPs have a Failed to fetch status error. |
719476 |
FortiLink NAC matched device is displayed in the CLI but not in the GUI under WiFi & Switch Controller > NAC Policies > View Matched Devices. |
722358 |
When a FortiGate local administrator is assigned to more than two VDOMs and tries logging in to the GUI console, they get a command parse error when entering VDOM configuration mode. |
729406 |
New IPsec design |
749843 |
Bandwidth widget does not display traffic information for VLAN interfaces when a large number of VLAN interfaces are configured. |
780832 |
WiFi & Switch Controller > Managed FortiAPs list does not load if there is an invalid or unsupported FortiAP configured. |
794656 |
After rebooting, the Licenses widget shows an |
794757 |
Inbound traffic on the interface bandwidth widget shows 0 bps on the VLAN interface. |
804584 |
On the policy dialog page, the Select Entries box for the Service field does not list all service objects if an IPv6 address is in the policy. |
807197 |
High |
819272 |
When a VLAN belongs to a zone, and the zone is used in a policy, editing the VLAN ID changes the policy's position in the table. |
820909 |
On the Policy & Objects > Schedules page, when the end date of a one-time schedule is set to the 31st of a month, it gets reset to the 1st of the same month. Workaround: use CLI to set schedules with an end date of 31st. |
821030 |
Security Fabric root FortiGate is unable to resolve firewall object conflicts in the GUI. |
821734 |
Log & Report > Forward Traffic logs do not show the Policy ID if there is no Policy Name. |
822991 |
On the Log & Report > Forward Traffic page, using the filter Result : Deny(all) does not work as expected. |
825377 |
Managed FortiSwitches page, policy pages, and some FortiView widgets are slow to load. |
827893 |
Security rating test for FortiCare Support fails when connected to FortiManager Cloud or FortiAnalyzer Cloud. |
829313 |
The dropdown field for the IdP Certificate is empty when editing an SSO user configuration (User & Authentication > Single Sign-On), even though the summary shows an IdP certificate. |
829736 |
Incorrect information is being displayed for the HA role on the System > HA page. |
829773 |
Unable to load the Network > SD-WAN > SD-WAN Rules table sometimes due to a JavaScript error. |
831439 |
On the WiFi & Switch Controller > SSIDs page, multiple DHCP servers for the same range can be configured on an interface if the interface name contains a comma (,) character. |
831885 |
Unable to access GUI via HA management interface of secondary unit. |
833306 |
Intermittent error, Failed to retrieve FortiView data, appears on real-time FortiView Sources and FortiView Destination monitor pages. |
833774 |
GUI needs to allow the members of the software switch interface to be used in IPv4/IPv6 multicast policy. |
835089 |
Unable to move SD-WAN rule ordering in the GUI (FortiOS 7.2.1). |
837048 |
Unable to delete the LAN interface's addresses without switching it back to a none-LAN role. |
837836 |
The Network > Interfaces faceplate shows two SFP interfaces, which do not exist on that FortiGate model. |
840604 |
When upgrading the FortiGate firmware upgrade from FortiGuard, update the API description text for the file name. |
842079 |
On the System > HA page, a Failed to retrieve info caution message appears when hovering over the secondary unit's Hostname. The same issue is observed on the Dashboard > Status > Security Fabric widget. |
845513 |
On G-model profiles, changing the platform mode change from single 5G (dedicated scan enabled) to dual 5G is not taking effect. |
854529 |
The local standalone mode in a VAP configuration is disabled when viewing or updating its settings in the GUI. |
HA
Bug ID |
Description |
---|---|
738728 |
The secondary unit tries to contact the forward server for sending the health check packets when the |
777394 |
Long-lasting sessions expire on the HA secondary in large session synchronization scenarios. |
783500 |
IPsec phase 2 is down because the connection expired due to RFC 6311 HA recovery failure. |
788702 |
Due to an HA port (Intel i40e) driver issue, not all SW sessions are synchronized to the secondary, so there is a difference. |
813207 |
Virtual MAC address is sent inside GARP by the secondary unit after a reboot. |
819872 |
HA split brain scenario occurs after upgrading from 6.4.6 to 7.0.6, and HA heartbeats are lost followed by a kernel panic. Affected platforms: NP7 models. |
823687 |
A cluster is repeatedly out-of sync due to external files (SSLVPN_AUTH_GROUPS) when there are frequent user logins and logouts. |
824200 |
HA is out-of-sync due to SD-WAN default configuration for a newly created VDOM. |
824651 |
Certificate upload causes HA checksum mismatch. |
826188 |
Secondary FortiGate FQDN is stuck in the queue, even if the primary FortiGate FQDN has already been resolved. |
829390 |
When the internet service name management checksum is changed, it is out-of-sync when the auto-update is disabled on FortiManager. |
830463 |
After shutting down the HA primary unit and then restarting it, the uptime for both nodes is zero, and it fails back to the former primary unit. |
830879 |
Running |
832470 |
HA A-P clusters keeps getting out-of-sync due to local VPN certificate. |
832634 |
HA failovers occur due to the kernel hanging on FG-100F. |
835331 |
Communication is disrupted when HA switching is performed in an environment where the VDOM is split to accommodate two IPoE lines. |
837888 |
CLI deployment of a configuration to the secondary unit results in an unresponsive aggregate interface. |
838571 |
After an HA split-brain event, the PPPoE interfaces are not recovered. |
839549 |
Secondary FortiGate unit in an HA cluster enters conserve mode due to high memory consumption by node scripts. |
840305 |
Static ARP entry is removed after reboot or HA failover. |
840954 |
The HA pair primary keeps sending |
843837 |
HA A-P virtual cluster information is not correctly presented in the GUI and CLI. |
843907 |
Session load balancing is not working in HA A-A configuration for traffic flowing via the VLAN interface when the port1 link is down on platforms with a 4.19 kernel. |
846015 |
The first ICMP redirected from the FGSP secondary is dropped on the FGSP primary when UTM is enabled. |
852308 |
New factory reset box failed to synchronize with primary, which was upgraded from 7.0. |
854445 |
When adding or removing an HA monitor interface, the link failure value is not updated. |
856004 |
Telnet connection running ping fails during FGSP failover for virtual wire pair with VLAN traffic. |
859242 |
Unable to synchronize IPsec SA between FGCP members after upgrading. |
Hyperscale
Bug ID |
Description |
---|---|
771857 |
Firewall virtual IP (VIP) features that are not supported by hyperscale firewall policies are no longer visible from the CLI or GUI when configuring firewall VIPs in a hyperscale firewall VDOM. |
804742 |
After changing hyperscale firewall policies, it may take longer than expected for the policy changes to be applied to traffic. The delay occurs because the hyperscale firewall policy engine enhancements added to FortiOS may cause the FortiGate to take extra time to compile firewall policy changes and generate a new policy set that can be applied to traffic by NP7 processors. The delay is affected by hyperscale policy set complexity, the total number of established sessions to be re-evaluated, and the rate of receiving new sessions. |
807476 |
After packets go through host interface TX/RX queues, some packet buffers can still hold references to a VDOM when the host queues are idle. This causes a VDOM delete error with |
810366 |
Unrelated background traffic gets impacted when changing a policy where a hyperscale license is used. |
824733 |
IPv6 traffic continues to pass through a multi-VDOM setup, even when the static route is deleted. |
835697 |
Interface routes under DHCP mode remain in LPMD after moving the interface to another VDOM. |
836474 |
Changes in the zone configuration are not updated by the NPD on hyperscale. |
837270 |
Allowing intra-zone traffic is now supported in hyperscale firewall VDOMs. Options to block or allow intra-zone traffic are available in the GUI and CLI. |
843305 |
Get |
ICAP
Bug ID |
Description |
---|---|
832515 |
Bad gateway occurs using ICAP with explicit proxy under traffic load. |
834729 |
Extra unnecessary X-Authenticated-User/Group field appears in the ICAP header. |
Intrusion Prevention
Bug ID |
Description |
---|---|
695464 |
High IPS engine CPU usage due to recursive function call. |
755859 |
The IPS sessions count is higher than system sessions, which causes the FortiGate to enter conserve mode. |
771000 |
High CPU in all cores with device running with one interface set as a one-arm sniffer. |
809691 |
High CPU usage on IPS engine when certain flow-based policies are active. |
839170 |
Improvements to IPS engine monitor to resolve an error condition during periods of heavy traffic loads. |
856616 |
High IPS engine memory usage after device upgrade. |
856837 |
Improvements to IPS engine to optimize memory usage when flow mode antivirus is applied. |
IPsec VPN
Bug ID |
Description |
---|---|
757696 |
Implementing the |
763205 |
IKE crashes after HA failover when the |
765174, 775279 |
Certain packets are causing IPsec tunnel drops on NP6XLite platforms after HA failover because the packet is not checked properly. |
765868 |
The packets did not pass through QTM, and SYN packets bypass the IPsec tunnel once traffic is offloaded. Affected platforms: NP7 models. |
798045 |
FortiGate is unable to install SA ( |
803010 |
The |
805301 |
Enabling NPU offloading in the phase 1 settings causes a complete traffic outage after a couple of ping packets pass through. |
807086 |
ADVPN hub randomly initiates secondary tunnel to spoke, causing spoke to drop tunnel traffic for RPF check fail. |
810833 |
IPsec static router gateway IP is set to the gateway of the tunnel interface when it is not specified. |
815253 |
NP7 offloaded egress ESP traffic that was not sent out of the FortiGate. |
819276 |
After changing the password policy to enable it, all non-conforming IPsec tunnels were wiped out after rebooting/upgrading. |
822651 |
NP dropping packet in the incoming direction for SoC4 models. |
824532 |
IPsec learned route disappears from the routing table. |
825523 |
NP7 drops outbound ESP after IPsec VPN is established for some time. |
827350 |
Dialup selector routes are not deleted after iked crash. |
828467 |
IKE repeatedly crashes with the combination of DDNS and dialup gateways. |
828541 |
IPsec DPD packets keep getting sent while IPsec traffic passes through the tunnel (DPD mode is |
828933 |
iked signal 11 crash occurs once when running a VPN test script. |
829091 |
The iked daemon experiences a signal 11 crash when a static IPsec gateway is configured, the FortiGates are in HA, and an HA state change occurs. |
829939 |
Unable to send traffic in VXLAN over IPSec when the VTEP is configured in a VDOM. |
830252 |
IPsec VPN statistics are not increasing on the device. |
831817 |
Entering |
832920 |
Unable to edit the parent interface from the IPsec configuration if it was configured on an IPIP tunnel. |
836260 |
The IPsec aggregate interface does not appear in the Interface dropdown when configuring the Interface Bandwidth widget. |
840006 |
A new VPN interface with |
840153 |
Unexpected dynamic selectors block traffic when |
840940 |
Unable to reestablish a new IPsec L2TP connection for 10 minutes after the previous one disconnected. The issue conditions are local in traffic and a policy-based IPsec tunnel. |
842528 |
Improper IKEv1 quick mode fragmentation from third-party client can cause an IKE crash. |
846361 |
OCVPN fails to create a policy when the interface belongs to a zone. |
855772 |
FortiGate IPsec tunnel role could be incorrect after rebooting or upgrading, and causes negotiation to be stuck when it comes up. |
858715 |
IPsec phase 2 fails when both HA cluster members reboot at the same time. |
Log & Report
Bug ID |
Description |
---|---|
789007 |
Unable to select FortiAnalyzer as a data source on the Summary tab for the System Events and Security Events pages. |
814758 |
Get an intermittent error when running |
820940 |
On the Log Settings page, a VDOM administrator can force a FortiCloud log out of for all VDOMs. |
821359 |
FortiGate appears to have a limitation in the syslogd filter configuration. |
821494 |
Forward traffic logs intermittently fail to show the destination hostname. |
825318 |
Archived Data tab is missing from intrusion prevention and application control log Details pane once |
826431 |
FortiGate Cloud log viewer shows no results for the 5 minutes and 1 hour time period due to an incorrect timestamp (24 hours is OK). |
826483 |
The |
828211 |
Policy ID filter is not working as expected. |
829862 |
On the Log & Report > ZTNA Traffic page, the client's Device ID is shown as [object Object]. The Log Details pane show the correct ID information. |
834669 |
GTP/PFCP |
836846 |
Packet captured by firewall policy cannot be downloaded. |
837116 |
FortiCloud log statistics chart on the Log Settings page shows incorrect data. |
838253 |
FortiAnalyzer log statistics chart on the Log Settings page shows incorrect data. |
839601 |
When log pages are scrolled down, no logs are displayed after 500 lines of logs. |
847213 |
Unable to mouse over an IP address in FortiGate logs. |
850519 |
Log & Report > Forward Traffic logs do not return matching results when filtered with !<application name>. |
856613 |
Older Forward Traffic logs are not visible on the FortiGate with 1 hour, 24 hours, and 7 days time period after upgrading. |
858304 |
When FortiGate Cloud logging is enabled, the option to display 7 days of logs is not visible on the Dashboard > FortiView pages. |
858589 |
Unable to download more than 500 logs from the FortiGate GUI. |
Proxy
Bug ID |
Description |
---|---|
745701 |
An issue occurs with TLS 1.3 and the 0RTT process where Firefox cannot access https.google.com using proxy-based UTM with certification inspection. |
780182 |
WAD crash occurred when forwarding the release bytes from the IPS engine to the server and the connection to the server is closed. |
793651 |
An expired certificate can be chosen when creating an SSL/SSH profile for deep inspection. |
795360 |
Apple push notification service fails with proxy-based inspection. |
796150, 857507 |
When a server sends a connection close response too early, traffic from the client may be interrupted inadvertently before the request is completed. |
797620 |
HTTPS sites blocked due to |
799237 |
WAD crash occurs when TLS/SSL renegotiation encounters an error. |
799381 |
WAD crash occurs when TLS 1.2 receives the client certificate and that server-facing SSL port has been closed due to the SSL bypass. |
803286 |
Inspecting all ports in deep inspection is dependent on previous protocol port mapping settings. |
805808 |
In proxy inspection mode with AV enabled, TCP traffic is dropped after a while. |
808831 |
Upgrading broke IM controls and caused Zalo chat file transfer issues. |
810792 |
WAD crashes when the following conditions are met: the FortiGate is an HA secondary, it is configured with a web proxy forward server in a proxy policy, and the forward server has health check enabled. |
813562, 823247, 823829, 829428 |
When an LDAP user is authenticated in a firewall policy, the WAD user-info process has a memory leak causing the FortiGate to enter conserve mode. |
814061 |
Stress test shows cryptographic errors in proxy mode. |
818371 |
An error condition occurs in WAD while parsing certain URIs. |
822039 |
WAD crash occurs on FG-61E, FG-101F, FG-61F, FG-200E, and FG-401E during stress testing. |
823814 |
When ZTNA access proxy is configured with |
825139 |
Image should be embedded directly into the replacement message page. |
825496 |
Explicit proxy traffic is terminated when IPS is enabled. The exact failure happened upon certificate inspection. |
827882 |
One WAD daemon is consistently using 99% CPU. |
830166 |
When WAN optimization is disabled and the dispatcher sends the tunnel manager listener to the workers, the workers cannot handle it properly and a WAD crash segmentation fault occurs. |
830450 |
Changing the virtual server configuration during traffic caused the old configuration to flush, which resulted in a WAD crash. |
830907 |
WAD crash occurs when configuring a proxy policy with no member in an address group. |
834314 |
ICAP client timeout issue causes WAD segmentation fault crash after upgrading to 7.0.6 from 6.4. |
834998 |
TLS 1.3 handshake fails in proxy mode when the FortiGate tries to obtain certificate information from a specific server. |
835903 |
There is no replacement message for an IPS custom signature block in a proxy inspection mode firewall policy or proxy policy. |
836198 |
Console randomly displays a |
837568 |
Restricted SaaS access does not work as expected when |
842197 |
Access proxy does not use the selected |
855882 |
Improvements to WAD to resolve a memory usage issue when user-info updates the FortiAP information. |
856235 |
The WAD process memory usage gradually increases over a few days, causing the FortiGate to enter into conserve mode. |
857368 |
An encoded HTTP header may be improperly handled, causing inadvertent disruption to traffic. |
874563 |
User information attributes can cause disruption when they are not properly merged. |
REST API
Bug ID |
Description |
---|---|
836760 |
The |
847526 |
Able to add incomplete policies with empty mandatory fields using the REST API. |
864393 |
High CPU usage of httpsd on FG-3600E HA system. |
Routing
Bug ID |
Description |
---|---|
769330 |
Traffic does not fail over to alternate path upon interface being down (FGR-60F in transparent mode). |
806501 |
Static routing using ISDB is randomly not working because the SD-WAN configuration is not flushed from the kernel routing table when SD-WAN is disabled. |
807433 |
Default routes are deleted after adding a new default route with a CIDR IP as a gateway. |
819674 |
Virtual server active-standby failover is not working with a UDP server type. |
822659 |
Secure SD-WAN Monitor in FortiAnalyzer does not show graphs when the SLA target is not configured in SD-WAN performance SLA. |
823293 |
Disabling BFD causes an OSPF flap/bounce. |
823592 |
BGP confederation and AS prepend the route advertisement format. |
828121 |
In a BGP neighbor, the |
828345 |
Wrong MAC address is in the ARP response for VRRP IP instead of the VRRP virtual MAC. |
828780 |
Router prefix list matching is not work properly for VPNv4 routes. |
830254 |
When changing interfaces from dense mode to sparse mode, and then back to dense mode, the interfaces did not show up under dense mode. |
830383 |
Unable to configure IPsec static route. |
833399 |
Static routes are incorrectly added to the routing table, even if the IPsec tunnel type is static. |
833800 |
The |
834497 |
Traffic behaves differently for connected routes and IGP routes in an ADVPN or SD-WAN environment. |
836077 |
IPv6 SD-WAN health check is not working after a disconnection. |
838091 |
Static routes from DHCP option 121 are not installed on the FortiGate acting as the DHCP client. |
838907 |
IPv6 link local address is added into the routing table. |
839669 |
Static route through an IPsec interface is not removed after the BFD neighbor goes down. |
840691 |
FortiGate as an NTP server is not using SD-WAN rules. |
843345 |
OSPF packets are unevenly distributed with the LAG hash algorithm. |
847037 |
When the policy route has a gateway set, the FortiGate is not following the policy route to forward traffic and sends unreasonable ARP requests. |
848270 |
Reply traffic from the DNS proxy (DNS database) is choosing the wrong interface. |
850862 |
When creating a new rule on the Network > Routing Objects page, the user cannot create a route map with a rule that has multiple similar or different AS paths in the GUI. |
862165 |
FortiGate does not add the route in the routing table when it changes for SD-WAN members. |
Security Fabric
Bug ID |
Description |
---|---|
753177 |
IoT device vulnerabilities should be included in security ratings. |
809106 |
Security Fabric widget and Fabric Connectors page do not identify FortiGates properly in HA. |
814796 |
The threat level threshold in the compromised host trigger does not work. |
819192 |
After adding a Fabric device widget, the device widget does not appear in the dashboard. |
822015 |
Unable to resolve dynamic address from ACI SDN connector on explicit web proxy. |
824433 |
After authorizing a downstream FortiGate, an empty name and offline status appear in the device registration wizard. |
835765 |
Automation stitch trigger is not working when the threshold based email alert is enabled in the configuration. |
837347 |
Upgrading from 6.4.8 to 7.0.5 causes SDN firewall address configurations to be lost. |
839258 |
Unable to add another FortiGate to the Security Fabric after updating to the latest patch. |
843043 |
Only the first ACI SDN connector can be kept after upgrading from 6.4.8 if multiple ACI SDN connectors are configured. |
844412 |
When a custom LLDP profile has |
848822 |
The FortiAP Firmware Versions and FortiSwitch Firmware Versions security rating tests fail because the firmware version on the FortiAPs and FortiSwitches is not recognized correctly. |
852340 |
Various places in the GUI do not show the secondary HA device. |
853406 |
External resource full certificate check does not validate certificate when the URI is an IP address. |
862532 |
Unable to load topology pages for a specific Security Fabric topology on the root and downstream FortiGates. |
SSL VPN
Bug ID |
Description |
---|---|
705880 |
Updated empty group with SAML user does not trigger an SSL VPN firewall policy refresh, which causes the SAML user detection to not be successful in later usage. |
746230 |
SSL VPN web mode cannot display certain websites that are internal bookmarks. |
776127 |
SSL VPN web proxy issue with Qlik web appliaction. |
777790 |
Unable to select |
783167 |
Unable to load GitLab through SSL VPN web portal. |
784426 |
SSL VPN web mode has problems accessing ComCenter websites. |
786056 |
VNC using SSL VPN web mode disconnects after 10 minutes. |
804131 |
SSL VPN bookmark is not working in https://vpn.li***.lt. |
808107 |
FortiGate is not sending Accounting-Request packet that contains the Interim-Update AVP when two-factor authentication is assigned to a user (defined on the FortiGate) while connecting using SSL VPN. |
808444 |
SSL VPN bookmark does not work when usergroup name has an ampersand character (&). |
809717 |
EICAR file cannot be blocked through the SSL VPN policy when NTurbo is enabled. |
812006 |
The PROD-MDN-WS1 SSL VPN portal is not loading properly, and cannot navigate within the page. |
812100 |
SSL VPN web mode fails to load some modules in customer's internal website (***.sri4.***). |
818066 |
SSL VPN web proxy could not render web application that uses a URL to pass a JSESSIONID |
818196 |
SSL VPN does not work properly after reconnecting without authentication and a TX drop is found. |
819296 |
GUI should not use <server_ip> as a sender to send the SSL VPN configuration (it should use value set in |
819754 |
Multiple DNS suffixes cannot be set for the SSL VPN portal. |
820072 |
Unable to open internal website with JavaScript code in SSL VPN web mode. |
820536 |
SSL VPN web mode bookmark incorrectly applies a URL redirect. |
822432 |
SSL VPN crashes after copying a string to the remote server using the clipboard in RDP web mode when using RDP security. |
822657 |
Internal resource pages and menus are not showing correctly in SSL VPN web mode. |
823054 |
Internal website with JavaScript lacks some menus in SSL VPN web mode. |
824681 |
Some back-end server images (*.co***.com) could not be displayed in SSL VPN web mode. |
825641 |
Camera application is not loading in SSL VPN web mode. |
825750 |
VMware vCenter bookmark in not working after logging in to SSL VPN web mode. |
825810 |
SSL VPN web mode is unable to access EMS server. |
826083 |
Unresponsive portal bookmark in SSL VPN web mode for server that does not support OpenSSL 3.0.2. |
828153 |
Faulty web view for JavaScript web applications in SSL VPN web portal. |
829663 |
A log in page display error occurs when using an SSL VPN web proxy. |
829955 |
When using SSL VPN to do auto-reconnect without authentication, it always fails the second time it tries to reconnect. |
830532 |
Unable to access internal device in SSL VPN web mode. |
830824 |
Veeam Backup Enterprise website has SSL VPN access problem in web mode. |
831069 |
A blank page displayed after logging in to the back-end server in SSL VPN web mode. |
834689 |
Unable to access customer's internal website in SSL VPN web mode. |
834713 |
Getting re-authentication pop-up window for VNC quick connection over SSL VPN web proxy. |
837028 |
Internal website cannot be displayed correctly in SSL VPN web mode. |
839261 |
On the VPN > SSL-VPN Settings page, when the This is cosmetic and does not affect on the FortiGate functionality or operation. The |
839743 |
Opening an SSL VPN web portal bookmark results in a blank page. |
844175 |
SSL VPN web mode failed to load some modules for internal website. |
847501 |
Internal website http://oc***.di***.com dropdown menu on an SSL VPN web mode bookmark in always stays on and does not close. |
848067 |
RDP over VPN SSL web mode stops work after upgrading. |
848312 |
Unable to open a PDF in SSL VPN web mode. |
848437 |
The sslvpn process crashes if a POST request with a body greater than 2 GB is received. |
849488 |
Bookmark in SSL VPN web portal does not work as expected. |
853556 |
The http://www.op***.org website does not work in SSL VPN web mode. |
856316 |
Browser displays an Error, Feature is not available message if a file larger than 1 MB is uploaded from FTP or SMB using a web bookmark, even though the file is uploaded successfully. There are no issues with downloading files. |
864417 |
In the second authentication of RADIUS two-factor authentication, the |
Switch Controller
Bug ID |
Description |
---|---|
818116 |
Add link status to managed FortiSwitch switch ports. |
836604 |
The |
840310 |
Managed FortiSwitch only shows one port of the FortiLink aggregate interface. |
853718 |
Layer 3 FortiLink does not come up after upgrading. |
854104 |
FortiLink daemon keeps pushing the configuration to FortiSwitch for a long time when the FortiSwitch is deleted and re-discovered. |
858113 |
On the WiFi & Switch Controller > Managed FortiSwitches page, when an administrator with restricted access permissions is logged in, the Diagnostics and Tools page for a FortiSwitch cannot be accessed. |
System
Bug ID |
Description |
---|---|
199732 |
The interface used by a sniffer policy cannot be used in a zone. |
686135 |
The dnp process goes to 100% CPU usage as soon as the configuration is downloaded via SCP. Affected platforms: FGR-60F and FGR-60F-3G4G. |
748409 |
Client traffic from VLAN to VXLAN encapsulation traffic is failing after upgrading. |
751715 |
Random LTE modem disconnections due to certain carriers getting unstable due to WWAN modem USB speed under super-speed. |
757482 |
When |
775793 |
Traffic shaping statistics do not work with NP7 offloading. |
780315 |
Poor CPS performance with VLAN interfaces in firewall only mode (NP7 and NP6 platforms). |
782962 |
PSU alarm log and SNMP trap are added for FG-10xF and FG-8xF models. |
784169 |
When a virtual switch member port is set to be an alternate by STP, it should not reply with ARP; otherwise, the connected device will learn the MAC address from the alternate port and send subsequent packets to the alternate port. |
787929 |
Deleting a VDOM that contains EMAC interfaces might affect the interface bandwidth widget of the parent VLAN. |
795104 |
A member of an LAG interface is not coming up due to a different actor key. |
798091 |
After upgrading from 6.4.9 to 7.0.5, the FG-110xE's 1000M SFP interface may fail to auto-negotiate and cannot be up due to the missed auto-negotiation. |
798303 |
The threshold for conserve mode is lowered. |
798992 |
Get newcli crash when running the |
800615 |
After a device reboot, the modem interface sometimes does not have a stable route with the local carrier. |
801040 |
Session anomaly was incorrectly triggered though concurrent sessions on the FortiGate that were below the configured threshold. |
804870 |
IPv6 DHCP relay packets traversing an |
805122 |
In FIPS-CC mode, if |
805345 |
In some cases, the HA SNMP OID responds very slowly or does work correctly. |
809030 |
Traffic loss occurs when running SNAT PBA pool in a hyperscale VDOM. The NP7 hardware module PRP got stuck, which caused the NP7 to hang. |
810879 |
DoS policy ID cannot be moved in GUI and CLI when enabling multiple DoS policies. |
813162 |
Kernel panic occurs after traffic goes through IPsec VPN tunnel and EMAC VLAN interface. |
814624 |
Get |
815360 |
NP7 platforms may encounter a kernel panic when deleting more than two hardware switches at the same time. |
815692 |
Slow upload speeds when connected to FIOS connection. Affected platforms: NP6Lite and NP6xLite. |
816385 |
When creating an inner VLAN CAPWAP interface or sending inner VLAN traffic when the FortiGate is rebooting/upgrading from |
818240 |
Running |
818452 |
The |
819460 |
There is no |
819667 |
1G copper SFP port is always up on FG-260xF. |
819724 |
LTE fails to connect after the firewall reboots. Multiple reboots are required to bring back connectivity. |
821366 |
PPPoE is not working on FG-60E wan2 interface. |
822297 |
Polling fgfwpolid returns disabled policies. |
823589 |
When pushing a script from FortiManager to FortiGate, FortiOS will sometimes send the CLI change to FortiManager with the FGFM API. If the tunnel is not up, the session will not exist and it causes a code crash. |
824464 |
CMDB checksum is not updated when a certificate is renewed over CMP, causing a FortiManager failure to synchronize with the certificate. |
824528 |
The cid process is consuming high memory, and the FortiGate enters conserve mode. |
824543 |
The |
825741 |
DoS policy with custom service does not work as expected on a PPPoE interface. |
826254 |
Get disk error message after changing disk usage to |
826440 |
Null pointer causing kernel crash on FWF-61F. |
827240 |
FortiGate may not provide detailed information during a watchdog-initiated reboot. |
827241 |
Unable to resolve sp***.saas.ap***.com on a specific VDOM. |
827736 |
As the size of the internet service database expands, |
829598 |
Constant increase (3%-4%) in memory occurs everyday. |
831486 |
HQIP memory test failed and triggered a log out with a newcli process crash. |
832154 |
The cmdbsvr process may crash when there are many addresses and address groups that include each other recursively. |
832429 |
Random kernel panic may occur due to an incorrect address calculation for the internet service entry's IP range. |
832948 |
Signature updating from FortiManager does not work after cloud communication is disabled. |
832982 |
High fcnacd usage occurs and unable to retrieve EMS information from the FortiGate CLI. |
833062 |
FortiGate becomes unresponsive, and there are many WAD and forticron crashes. |
834138 |
Kernel panic occurs due to VXLAN. |
834414 |
When the uplink modem is restarted, the FortiGate interface configured as PPPoE is unable to obtain an IP address. |
834641 |
Unable to remove DDNS entry frequently, even if the DDNS setting is disabled. |
834762 |
Kernel panics occurs on secondary HA node on NP7 models (7.0.6). |
835221 |
FG-4400F setting speed of |
836049 |
Unexpected device reboots with the kernel panic error on NP7 models. |
836409 |
When deleting a non-existing entry, the error code returned is not appropriate. |
837110 |
Burst in multicast packets is causing high CPU usage on multiple CPU cores. |
837730 |
Trusted hosts are not working correctly in FortiOS 7.2.1. |
838933 |
DoS anomaly has incorrect threshold after loading a modified configuration file. |
839190 |
Running |
840175 |
Random kernel panic occurs and causes the device to reboot. |
841932 |
The GUI and API stopped working after loading many interfaces due to httpsd stuck in a D state (kernel I/O socket). |
844316 |
IPS and application control is causing the FortiGate (VWP) to change either the source MAC address or the destination MAC address based on the flow. |
844937 |
FG-3700D unexpectedly reboots after the COMLog reported a kernel panic due to an IPv6 failure to set up the master session for the expectation session under some conditions. |
845781 |
Kernel panic and regular reboots occur on NP7 platforms, which are caused by FortiOS trying to offload a receiving ESP packet from the EMAC VLAN interface and convert to an IPv6 destination address with NAT46 NPU offloaded sessions. |
847077 |
|
849186 |
Unexpected console error appears: |
850430 |
DHCP relay does not work properly with two DHCP relay servers configured. |
850797 |
Remote access management from a FortiManager login fails if trusted hosts are configured for the administrator account. |
852562 |
Huge configuration files cause delays during the booting process. |
853144 |
Network device kernel null pointer is causing a kernel crash. |
853794 |
Issue with the |
855151 |
There may be a race condition between the CMDB initializing and the customer language file loading, which causes the customer language file to be removed after upgrading. |
856202 |
Random reboots and kernel panic on NP7 cluster when the FortiGate sends a TCP RST packet and IP options are missing in the header. |
859717 |
The FortiGate is only offering the |
860052 |
The 40G/100G port goes down on FG-260xF when upgrading to 7.2. |
862941 |
GUI displays a blank page if |
867978 |
Subnet overlap error occurs when configuring the same IPv4 link-local addresses on two different interfaces. |
Upgrade
Bug ID |
Description |
---|---|
803041 |
Link lights on the FG-1100E fail to come up and are inoperative after upgrading. |
822844 |
Observed |
832943 |
Upgrading from 7.0.5 (split-VDOM mode) to 7.2.0 converts to multi-VDOM). Certificates are not exported in the backup configuration. |
841808 |
Traffic counters in |
850691 |
The |
User & Authentication
Bug ID |
Description |
---|---|
790884 |
The FortiGate will not send a MAC-based authentication RADIUS authentication request for one of the devices on the network. |
810033 |
The samld process is killed if the SP certificate set has an ECC 384-bit public key. |
818163 |
Remote RADIUS user password change does not work if password encoding is ISO-8859-1 on the FortiGate. |
819309 |
Unable to create a new guest user if its ID is the ASCII code of a character that is the name of a local user. |
820989 |
The |
822684 |
When multiple FSSO CA connections are configured at the same time, only the last configured FSSO connection comes up. |
822923 |
When a device is detected as vulnerable, its source is not set and the inventory query quits. |
823227 |
FortiGate is adding the same LDAP server in the list of LDAP servers to try twice in fnbamd. |
824999 |
Subject Alternative Name (SAN) is missing from the certificate upon automatic certificate renewal made by the FortiGate. |
825505 |
After a few days, some devices are not displayed in the Users & Devices > Device Inventory widget and WiFi & Switch Controller > FortiSwitch Ports page's Device Information column due to a mismatch in the device count between the following commands.
|
825759 |
The Device detection option is missing in the GUI for redundant interfaces (CLI is OK). |
827458 |
A User device store query error (error code: -1) warning appears on the Asset Identity Center page. |
828212 |
RADIUS Access Request message needs to be sent when the client reconnects during firewall authentication session expiration. |
829343 |
Unknown CA issue can be bypassed when connecting Fortinet hosted servers. |
829656 |
The device identification scanner crashes due to delayed fragments. |
833802 |
RADIUS re-authentication is not following RFC 2865 standards. |
835859 |
Incorrect source MAC address is used in LLDP TX packet when the interface has |
836082 |
LLDP packets are not being received if mgmt is used as an HA management reservation interface. |
839801 |
FortiToken purge in a VDOM clears all FortiToken statuses in the system. |
841566 |
The cid process crashes when cloning of 60000 security policies. |
842517 |
Adding a local user to a group containing many users causes a delay in GUI and CLI due to cmdbsvr (high CPU). |
843528 |
RADIUS MAC authentication using ClearPass is intermittently using old credentials. |
851233 |
FortiToken activation emails should include HTTPS links to documentation instead of HTTP. |
854114 |
Some embedded SSL certificates entered the |
856370 |
The EAP proxy worker application crashes frequently. |
865166 |
A cid scan crash occurs when device detections happen in a certain order. |
VM
Bug ID |
Description |
---|---|
740796 |
IPv6 traffic triggers |
798717 |
Traffic/session logging incorrectly refers to SR-IOV secondary interfaces when the Rx is from fast path. |
820457 |
Dynamic address objects are removed after Azure API call failed and caused legitimate traffic drop. |
825464 |
Every time the FortiGate reboots, the certificate setting reverts to |
848279 |
SFTP backup not working with Azure storage account. |
859165 |
Unable to enable FIPS cipher mode on FG-VM-ARM64-AWS. |
859589 |
VPNs over Oracle Cloud stop processing traffic. |
Web Application Firewall
Bug ID |
Description |
---|---|
817673 |
Problem accessing some web servers when WAF and AV are enabled in same policy (proxy inspection mode). |
838913 |
The WAF is indicating malformed request false positives caused by incorrect setups of four known headers: Access-Control-Max-Age, Access-Control-Allow-Headers, Access-Control-Allow-Methods, and Origin. |
Web Filter
Bug ID |
Description |
---|---|
742483 |
System events logs randomly contain a |
816781 |
FGSP cluster with UTM blocks websites when NTurbo or offloading is enabled. |
829628 |
Support matching IPv4 mapped IPv6 hostnames in the URL filter. |
829704 |
Web filter is not logging all URLs properly. |
847676 |
|
852067 |
Duplicate |
WiFi Controller
Bug ID |
Description |
---|---|
807605 |
FortiOS exhibits segmentation fault on hostapd on the secondary controller configured in HA. |
807713 |
FortiGate is not sending RADIUS accounting message consistently to RADIUS server for wireless SSO. |
809623 |
CAPWAP traffic is dropped when |
811953 |
Configuration installation from FortiManager breaks the quarantine setting, and the VAP becomes undeletable. |
821320 |
FG-1800F drops wireless client traffic in L2 tunneled VLAN with |
821803 |
Wireless multicast traffic causes the cw_acd process to have high CPU usage and triggers a hostapd crash. |
824441 |
Suggest replacing the IP Address column with MAC Address in the Collected Email widget. |
827902 |
CAPWAP data traffic over redundant IPsec tunnels failing when the primary IPsec tunnel is down (failover to backup tunnel). |
828901 |
Connectivity loss occurs due to switch and FortiAPs (hostapd crash). |
831736 |
Application hostapd crash found on FG-101F. |
831932 |
The cw_acd process crashes several times after the system enters conserve mode. |
834644 |
A hostapd process crash is shown in device crash logs. |
837130 |
Wireless client shows portal related webpage while doing MAC authentication with MAB mode. |
840717 |
CAPWAP daemon (cw_acd) experiences a signal 11 crash when reconnecting a FortiAP to the FortiGate, and the FortiGate does not populate SA scan data on |
844172 |
The cw_acd process is deleting dynamic IPsec tunnels on the secondary device, which causes the FortiAPs to disconnect on the primary device. |
846730 |
Dynamic VLAN assignment is disabled in the GUI when editing an SSID with |
851507 |
FortiAP goes through DTLS_SETUP for standby session when the ACD count is set to multicore. |
856038 |
The |
856830 |
HA FortiGate encounters multiple hostapd crashes. |
857084 |
Hostapd segmentation fault signal 6 occurs upon HA failover. |
857140 |
Hostapd segmentation fault signal 11 occurs upon RF chamber setup. |
857975 |
The cw_acd process appears to be stuck, and is sending several access requests for MAC authentication. |
858653 |
Invalid wireless MAC OUI detected for a valid client on the network. |
861552 |
Wireless client gets disconnect from WiFi if it is connected to a WPA2 SSID more than 12 hours. |
ZTNA
Bug ID |
Description |
---|---|
777190 |
Proxy policy disclaimer is not working, even when there is no |
792829 |
WAD re-challenges user authentication upon HA failover. |
822423 |
Support the browser version in the |
828433 |
FortiAuthenticator Cloud zero trust tunnel (ZTNA connection) fails when EMS Fabric connector is configured. |
832508 |
The EMS tag name (defined in the EMS server's Zero Trust Tagging Rules) format changed in 7.2.1 from After upgrading from 7.2.0 to 7.2.1, the EMS tag format was converted properly in the CLI configuration, but the WAD daemon is unable to recognize this new format, so the ZTNA traffic will not match any ZTNA policies with EMS tag name checking enabled. |
845321 |
An offline FortiClient should be immediately rejected by ZTNA. |
848222 |
ZTNA TCP forwarding is not working when a real server is configured with an FQDN address type. An FQDN address type that can resolve public IPs is not recommended for ZTNA TCP forwarding on real servers because the defined internal DNS database zone is trying to override it at the same time. By doing so, the internal private address may not take effect after rebooting, and causes a ZTNA TCP forwarding failure due to the real server not being found. |
859421 |
ZTNA server (access proxy VIP) is causing all interfaces that receive ARP request to reply with their MAC address. |
875589 |
An error case occurs in WAD when a client EMS tag changes. |
Common Vulnerabilities and Exposures
Visit https://fortiguard.com/psirt for more information.
Bug ID |
CVE references |
---|---|
841788 |
FortiOS 7.2.4 is no longer vulnerable to the following CVE Reference:
|
843331 |
FortiOS 7.2.4 is no longer vulnerable to the following CVE Reference:
|
844920 |
FortiOS 7.2.4 is no longer vulnerable to the following CVE Reference:
|
845847 |
FortiOS 7.2.4 is no longer vulnerable to the following CVE Reference:
|
847483 |
FortiOS 7.2.4 is no longer vulnerable to the following CVE Reference:
|
854171 |
FortiOS 7.2.4 is no longer vulnerable to the following CVE Reference:
|
854227 |
FortiOS 7.2.4 is no longer vulnerable to the following CVE Reference:
|
857368 |
FortiOS 7.2.4 is no longer vulnerable to the following CVE Reference:
|
858793 |
FortiOS 7.2.4 is no longer vulnerable to the following CVE Reference:
|
861922 |
FortiOS 7.2.4 is no longer vulnerable to the following CVE Reference:
|
865932 |
FortiOS 7.2.4 is no longer vulnerable to the following CVE Reference:
|
865935 |
FortiOS 7.2.4 is no longer vulnerable to the following CVE Reference:
|