B&B Bezpieczeństwo w biznesie
  • Start
  • O nas
  • Produkty
  • Usługi
    • Szkolenia
    • Cyberbezpieczny Samorząd
    • Audyt bezpieczeństwa informacji
      • Testy penetracyjne
      • Testy ataków socjotechnicznych
    • Audyt konfiguracji Fortigate
    • Prezentacje
    • Wdrożenia
  • Blog techniczny
  • Pomoc
  • Kariera
  • Kontakt

Producent oprogramowania Fortinet opublikował aktualizację dla produktu FortiGate o numerze wersji 7.0.7. Na skutek tego aktualizacja jest pozbawiona podatności o numerze CVE 2022-40684, która pozwalała na wykonywanie operacji osób nieuwierzytelnionych w interfejsie administracyjnym za pośrednictwem specjalnych spreparowanych żądań HTTP lub HTTPS. Po więcej ciekawych informacji zapraszamy do dalszej części posta.

Aktualnie wspierane modele:

FortiGate FG-40F, FG-40F-3G4G, FG-60E, FG-60E-DSL, FG-60E-DSLJ, FG-60E-POE, FG-60F, FG-61E, FG-61F, FG-80E, FG-80E-POE, FG-80F, FG-80F-BP, FG-80F-POE, FG-81E, FG-81E-POE, FG-81F, FG-81F-POE, FG-90E, FG-91E, FG-100E, FG-100EF, FG-100F, FG-101E, FG-101F, FG-140E, FG-140E-POE, FG-200E, FG-200F, FG-201E, FG-201F, FG-300E, FG-301E, FG‑400E, FG-400E-BP, FG‑401E, FG‑500E, FG-501E, FG-600E, FG-601E, FG-800D, FG‑900D, FG-1000D, FG-1100E, FG-1101E, FG‑1200D, FG-1500D, FG-1500DT, FG-1800F, FG-1801F, FG-2000E, FG-2200E, FG-2201E, FG-2500E, FG-2600F, FG-2601F, FG-3000D, FG-3100D, FG‑3200D, FG-3300E, FG-3301E, FG-3400E, FG-3401E, FG-3500F, FG-3501F, FG-3600E, FG-3601E, FG-3700D, FG-3800D, FG-3960E, FG‑3980E, FG-4200F, FG-4201F, FG-4400F, FG-4401F, FG-5001E, FG‑5001E1
FortiWiFi FWF-40F, FWF-40F-3G4G, FWF-60E, FWF-60E-DSL, FWF-60E-DSLJ, FWF-60F, FWF-61E, FWF-61F, FWF-80F-2R, FWF-81F-2R, FWF-81F-2R-POE, FWF-81F-2R-3G4G-POE
FortiGate Rugged FGR-60F, FGR-60F-3G4G
FortiGate VM FG-ARM64-AWS, FG-ARM64-KVM, FG-VM64, FG-VM64-ALI, FG-VM64-AWS, FG-VM64-AZURE, FG‑VM64‑GCP, FG-VM64-HV, FG-VM64-IBM, FG-VM64-KVM, FG‑VM64‑OPC, FG‑VM64-RAXONDEMAND, FG-VM64-SVM, FG-VM64-VMX, FG-VM64-XEN
Pay-as-you-go images FOS-VM64, FOS-VM64-HV, FOS-VM64-KVM, FOS-VM64-XEN

Rozwiązane problemy:

Bug ID CVE references
846234 FortiOS 7.0.7 is no longer vulnerable to the following CVE Reference:

  • CVE-2022-40684
846854 FortiOS 7.0.7 is no longer vulnerable to the following CVE Reference:

  • CVE-2022-40684

 

Znane problemy:

Anti Virus

Bug ID Description
727067 FortiGate should fix the interface between FortiGate and FortiAnalyzer for the CDR file.
795784 Able to bypass FortiOS AV inspection on email traffic when manipulating a MIME attachment with junk and pad characters in Base64.
800731 Flow AV sends HTML files to the FortiGate Cloud Sandbox every time when HTML is not configured in file list.
805655 A scanunit crash with signal 11 occurs for SMTP and QP encoding.

Endpoint Control

Bug ID Description
730767 The new HA primary FortiGate cannot get EMS Cloud information when HA switches over.

Workaround: delete the EMS Cloud entry then add it back.

775742 Upgrade EMS tags to include classification and severity to guarantee uniqueness.

Firewall

Bug ID Description
824091 Promethean Screen Share (multicast) is not working on the member interfaces of a software switch.

FortiView

Bug ID Description
804177 When setting the time period to now filter, the table cannot be filtered by policy type.
811095 Threat type N/A – Static URL Filter is showing on sources that do not have the URL filter enabled.

GUI

Bug ID Description
440197 On the System > FortiGuard page, the override FortiGuard server for AntiVirus & IPS Updates shows an Unknown status, even if the server is working correctly. This is a display issue only; the override feature is working properly.
677806 On the Network > Interfaces page when VDOM mode is enabled, the Global view incorrectly shows the status of IPsec tunnel interfaces from non-management VDOMs as up. The VDOM view shows the correct status.
685431 On the Policy & Objects > Firewall Policy page, the policy list can take around 30 seconds or more to load when there is a large number (over 20 thousand) of policies.

Workaround: use the CLI to configure policies.

707589 System > Certificates list sometimes shows an incorrect reference count for a certificate, and incorrectly allows a user to delete a referenced certificate. The deletion will fail even though a success message is shown. Users should be able to delete the certificate after all references are removed.
708005 When using the SSL VPN web portal in the Firefox, users cannot paste text into the SSH terminal emulator.

Workaround: use Chrome, Edge, or Safari as the browser.

749843 Bandwidth widget does not display traffic information for VLAN interfaces when a large number of VLAN interfaces are configured.
755177 When upgrade firmware from 7.0.1 to 7.0.2, the GUI incorrectly displays a warning saying this is not a valid upgrade path.
777145 Managed FortiSwitches page incorrectly shows a warning about an unregistered FortiSwitch even though it is registered. This only impacts transferred or RMAed FortiSwitches. This is only a display issue with no impact on the FortiSwitch’s operation.

Workaround: confirm the FortiSwitch registration status in the FortiCare portal.

798161 System > Certificates page keeps spinning when trying to access it from Safari.
810225 An undefined error is displayed when changing an administrator password for the first time. Affected models: NP7 platforms.
831885 Unable to access GUI via HA management interface of secondary unit.

HA

Bug ID Description
750978 Interface link status of HA members go down when cfg-revert tries to reboot post cfg-revert-timeout.
782734 Cluster is out-of-sync due to switch controller managed switch checksum mismatch.
785514 In some situations, the fgfmd daemon is blocked by a query to the HA secondary checksum, which causes the tunnel between the FortiManager and FortiGate to go down.
803354 After HA-AP failover, the FortiExtender WAN interface of the new primary cannot get the LTE IP address from FortiExtender.
810286 FGSP local sessions exist after rebooting an HA pair with A-P mode, and the HW SSE/session count is incorrect.
811535 HA failure occurs on pair of FG-2600s due to packet loss on heartbeat interface.
830463 After shutting down the HA primary unit and then restarting it, the uptime for both nodes is zero, and it fails back to the former primary unit.

Hyperscale

Bug ID Description
804742 After changing hyperscale firewall policies, it may take longer than expected for the policy changes to be applied to traffic. The delay occurs because the hyperscale firewall policy engine enhancements added to FortiOS 7.0.6 may cause the FortiGate to take extra time to compile firewall policy changes and generate a new policy set that can be applied to traffic by NP7 processors. The delay is affected by hyperscale policy set complexity, the total number of established sessions to be re-evaluated, and the rate of receiving new sessions.
805846 In the FortiOS MIB files, the trap fields fgFwIppStatsGroupName and fgFwIppStatsInusePBAs have the same OID. As a result, the fgFwIppStatsInusePBAs field always returns a value of 0.
807476 After packets go through host interface TX/RX queues, some packet buffers can still hold references to a VDOM when the host queues are idle. This causes a VDOM delete error with unregister_vf. If more packets go through the same host queues for other VDOMs, the issue should resolve by itself because those buffers holding the VDOM reference can be pushed and get freed and recycled.
810025 Using EIF to support hairpinning does not work for NAT64 sessions.
810379 Creating an access control list (ACL) policy on a FortiGate with NP7 processors causes the npd process to crash.
811109 FortiGate 4200F, 4201F, 4400F, and 4401F HA1, HA2, AUX1, and AUX2 interfaces cannot be added to an LAG.
812833 FortiGate still holds npu-log-server related configuration after removing hyperscale license.
836976 Traffic impact on changing from log to hardware to log to host during runtime (with PPA enabled).
837270 Disabling Block intra-zone traffic in a zone does not allow TCP/UDP traffic between interfaces of a zone.
838654 Hit count not ticking for implicit deny policy for hardware session in case of NAT46 and NAT64 traffic.
839958 service-negate does not work as expected in a hyperscale deny policy.
842008 After HA failover, session count cannot synchronize on secondary FortiGate.
843197 Output of diagnose sys npu-session list/list-full does not mention policy route information.
843266 Diagnose command should be available to show hit_count/last_used for policy route and NPU session on hyperscale VDOM.
843305 Get PARSE SKIP ERROR=17 NPD ERR PBR ADDRESS console error log when system boots up.
846520 NPD/LPMD process killed by out of memory killer after running mixed sessions and HA failover.

IPsec VPN

Bug ID Description
761754 IPsec aggregate static route is not marked inactive if the IPsec aggregate is down.
790486 Support IPsec FGSP per tunnel failover.
810988 GUI does not allow IP overlap for a tunnel interface when allow-subnet-overlap is enabled (CLI allows it).
815253 NP7 offloaded egress ESP traffic that was not sent out of the FortiGate.
815969 Cannot apply dialup IPsec VPN settings modifications in the GUI when net-device is disabled.

Log & Report

Bug ID Description
790893 Logging filters do not work as expected.
814427 FortiGate error in FortiAnalyzer connectivity test on secondary device after upgrade.
821359 FortiGate appears to have a limitation in the syslogd filter configuration.

Proxy

Bug ID Description
768278 WAD crashes frequently, authentication stops, and firewall freezes once proxy policy changes are pushed out.
793651 An expired certificate can be chosen when creating an SSL/SSH profile for deep inspection.
809346 FTPS helper is not opening pinholes for expected traffic for non-standard ports.
823247 WAD user_info process leaks memory.

Routing

Bug ID Description
756955 Routing table does not reflect the new changes for the static route until the routing process is restarted when cmdbsrv and other processes take CPU resources upon every configuration change in devices with over ten thousand firewall policies.
795213 On the Network > SD-WAN page, adding a named static route to an SD-WAN zone creates a default blackhole route.
796070 Incorrect SD-WAN kernel routes are used on the secondary device.
796409 GUI pages related to SD-WAN rules and performance SLA take 15 to 20 seconds to load.
808840 After cloning a static route, the URL gets stuck with "clone=true".

Security Fabric

Bug ID Description
614691 Slow GUI performance in large Fabric topology with over 50 downstream devices.
794703 Security Rating report for Rogue AP Detection and FortiCare Support checks show incorrect results.
803600 Automation stitch for a scheduled backup is not working.
814796 The threat level threshold in the compromised host trigger does not work.
815984 Azure SDN connector has a 403 error when the AZD restarts.

SSL VPN

Bug ID Description
626311 SSL VPN users are remaining logged on past the auth-timeout value.
767832 After upgrading from 6.4.7 to 7.0.1, the Num Lock key is turned off on the SSL VPN webpage.
780765 High CPU usage in SSL VPN using libssh2.
789642 Unable to load Grafana application through SSL VPN web mode.
796768 SSL VPN RDP is unable to connect to load-balanced VMs.
809209 SSL VPN process memory leak is causing the FortiGate to enter conserve mode over a short period of time.
809473 When sslvpnd debugs are enabled, the SSL VPN process crashes more often.
810715 Web application is not loading in the SSL VPN web mode.
811007 The auto-generated URL on the VPN > SSL-VPN Settings page shows the management IP of the FortiGate instead of the SSL VPN interface port IP as defined on the VPN > SSL-VPN Realms page when a realm is created.
811492 SSL VPN should not leak information while performing Telnet.
814040 SSL VPN bookmark configuration is added automatically after client logs in to web mode.
814708 The same SAML user failed to establish a tunnel when a stale web session exists with limit-user-logins enabled.
816716 sslvpnd crashed when deleting a VLAN interface.
816881 TX packet loss on ssl.root interface.
817843 Logging out of SSL VPN tunnel mode does not clear the authenticated list.
819296 GUI should not use <server_ip> as a sender to send the SSL VPN configuration (it should use value set in reply-to).

Switch Controller

Bug ID Description
794026 FortiGates quarantines are stuck at 256.
803307 The Enable STP security control description should be reworded to mention that Edge ports should have STP enabled once the network topology is stable.
805154 Switch controller preconfiguration of FortiSwitch 108F-POE is incorrect.
810550 Send DHCP/ARP packet failed, and get errno = 6 in log when config-sync runs.

System

Bug ID Description
724085 Traffic passing through an EMAC VLAN interface when the parent interface is in another VDOM is blocked if NP7 offloading is enabled. If auto-asic-offload is disabled in the firewall policy, then the traffic flows as expected.
751870 User should be disallowed from sending an alert email from a customized address if the email security compliance check fails.
764252 On FG-100F, no event is raised for PSU failure and the diagnostic command is not available.
764954 FortiAnalyzer serial number automatically learned from miglogd does not send it to FortiManager through the automatic update.
787595 FFDB cannot be updated with exec update-now or execute internet-service refresh after upgrading the firmware in a large configuration.
789153 A profile with higher privileges than the user’s own profile can be set.
798091 After upgrading from 6.4.9 to 7.0.5, the FG-110xE’s 1000M SFP interface may fail to auto-negotiate and cannot be up due to the missed auto-negotiation.
798303 The threshold for conserve mode is lowered.
800294 Interface migration wizard fails to migrate interfaces when VLANs have dependencies within dependencies.
801053 FG-1800F existing hardware switch configuration fails after upgrading.
807947 Unable to create new interface and VDOM link with names that contain spaces.
813223 Random kernel panic occurs due to calling timer_setup.
815360 NP7 platforms may encounter a kernel panic when deleting more than two hardware switches at the same time.
819640 SSH public key changes after every reboot.
824464 CMDB checksum is not updated when a certificate is renewed over CMP, causing a FortiManager failure to synchronize with the certificate.

Upgrade

Bug ID Description
803041 Link lights on the FG-1100E fail to come up and are inoperative after upgrading.

User & Authentication

Bug ID Description
813407 Captive portal authentication with RADIUS user group truncates the token code to eight characters.

VM

Bug ID Description
786278 Bandwidth usage is not shown when DPDK is enabled.
803219 Azure SDN connector might miss dynamic IP addresses due to only the first page of the network interface being processed.
809963 Get cmdbsvr crash on FG-KVM32 after running concurrent performance test.

WAN Optimization

Bug ID Description
728861 HTTP/HTTPS traffic cannot go through when wanopt is set to manual mode and an external proxy is used.

Workaround: set wanopt to automatic mode, or set transparent disable in the wanopt profile.

Web Filter

Bug ID Description
766126 Block replacement page is not pushed automatically to replace the video content when using a video filter.

WiFi Controller

Bug ID Description
796036 Manual quarantine for wireless client connected to SSID on multi-VDOM with wtp-share does not work.
807713 FortiGate is not sending RADIUS accounting message consistently to RADIUS server for wireless SSO.
809623 CAPWAP traffic is dropped when capwap-offloading is enabled.
811953 Configuration installation from FortiManager breaks the quarantine setting, and the VAP becomes undeletable.
821803 Wireless multicast traffic causes the cw_acd process to have high CPU usage and triggers a hostapd crash.

 

Notatki producenta: FortiOS 7.0.7

Pozdrawiamy,

Zespół B&B
Bezpieczeństwo w biznesie

Post Views: 1 110

7.0.7 FortiGate FortiGate 7.0.7

Poprzedni artykułFortiAuthenticator 6.4.6Następny artykuł FortiOS 7.2.2

Najnowsze

FortiAnalyzer 7.6.38 maja 2025
FortiManager 7.6.330 kwietnia 2025
FortiMail 7.6.322 kwietnia 2025

Kategorie

  • Acronis
  • Aktualności
  • Bez kategorii
  • ESET
  • F-Secure
  • FortiAnalyzer
  • FortiAP
  • FortiAuthenticator
  • FortiClient
  • FortiDeceptor
  • FORTIGATE
  • FORTIMAIL
  • FortiManager
  • FortiNAC
  • FortiSIEM
  • FORTISWITCH
  • FortiWeb
  • NAKIVO
  • Proget
  • Qnap
  • Stormshield
  • Szkolenia
  • Veeam
  • VMware
  • WithSecure

Tagi

6.0.6 6.2.2 6.2.7 6.4.0 6.4.4 6.4.5 6.4.8 7.0.0 7.0.2 7.0.5 7.2.0 7.2.2 ems Eset eset endpoint antivirus eset endpoint security ESET Inspect ESET Protect ESET Protect Cloud F-Secure FMG FortiAnalyzer forti analyzer FortiAP fortiap-w2 FortiAuthenticator FortiClient FortiClientEMS forticlient ems FortiGate FortiMail FortiManager FortiNAC Fortinet FortiOS FortiSIEM FortiSwitch FortiWeb vCenter vCenter Server VMware VMware ESXi vmware esxi 8.0 vmware vcenter VMware vCenter Server

MENU

  • Start
  • O nas
  • Produkty
  • Usługi
    • Szkolenia
    • Cyberbezpieczny Samorząd
    • Audyt bezpieczeństwa informacji
      • Testy penetracyjne
      • Testy ataków socjotechnicznych
    • Audyt konfiguracji Fortigate
    • Prezentacje
    • Wdrożenia
  • Blog techniczny
  • Pomoc
  • Kariera
  • Kontakt

BLOG TECHNICZNY

FortiAnalyzer 7.6.38 maja 2025
FortiManager 7.6.330 kwietnia 2025
FortiMail 7.6.322 kwietnia 2025

KONTAKT

biuro@b-and-b.plhttps://www.b-and-b.pl
8:00-16:00
RODO | POLITYKA PRYWATNOŚCI
OGÓLNE WARUNKI REKLAMACJI

BEZPIECZEŃSTWO W BIZNESIE 2025 - wszystkie prawa zastrzeżone

MENU

  • Start
  • O nas
  • Produkty
  • Usługi
    • Szkolenia
    • Cyberbezpieczny Samorząd
    • Audyt bezpieczeństwa informacji
      • Testy penetracyjne
      • Testy ataków socjotechnicznych
    • Audyt konfiguracji Fortigate
    • Prezentacje
    • Wdrożenia
  • Blog techniczny
  • Pomoc
  • Kariera
  • Kontakt

BLOG TECHNICZNY

FortiAnalyzer 7.6.38 maja 2025
FortiManager 7.6.330 kwietnia 2025
FortiMail 7.6.322 kwietnia 2025

Kontakt

+48 500-413-313
biuro@b-and-b.pl
8:00-16:00
Add new entry logo

Korzystamy z plików cookies lub podobnych technologii, by lepiej dopasować treści na stronie do Twoich potrzeb. W każdej chwili możesz zmienić ustawienia cookies. Polityka prywatności

Akceptuję Odmów
Cookies are small text files that can be used by websites to make a user's experience more efficient. The law states that we can store cookies on your device if they are strictly necessary for the operation of this site. For all other types of cookies we need your permission. This site uses different types of cookies. Some cookies are placed by third party services that appear on our pages.
  • Always Active
    Necessary
    Necessary cookies help make a website usable by enabling basic functions like page navigation and access to secure areas of the website. The website cannot function properly without these cookies.

  • Marketing
    Marketing cookies are used to track visitors across websites. The intention is to display ads that are relevant and engaging for the individual user and thereby more valuable for publishers and third party advertisers.

  • Analytics
    Analytics cookies help website owners to understand how visitors interact with websites by collecting and reporting information anonymously.

  • Preferences
    Preference cookies enable a website to remember information that changes the way the website behaves or looks, like your preferred language or the region that you are in.

  • Unclassified
    Unclassified cookies are cookies that we are in the process of classifying, together with the providers of individual cookies.