B&B Bezpieczeństwo w biznesie
  • Start
  • O nas
  • Produkty
  • Usługi
    • Szkolenia
    • Cyberbezpieczny Samorząd
    • Audyt bezpieczeństwa informacji
      • Testy penetracyjne
      • Testy ataków socjotechnicznych
    • Audyt konfiguracji Fortigate
    • Prezentacje
    • Wdrożenia
  • Blog techniczny
  • Pomoc
  • Kariera
  • Kontakt

Producent oprogramowania Fortinet udostępnił najnowszą aktualizację dla produktu FortiOS 6.4.11. Dzięki aktualizacji, został poprawiony problem przy połączeniach realizowanych za pomocą tunelu L2TP, gdzie urządzenia z oprogramowaniem Android po rozłączeniu się, dalej posiadały aktywne połączenie. Ponadto, od wersji 6.4.9 korzystanie z technologii DoS powodowało zawieszanie procesów npd ale nowsza wersja naprawiła ten problem. Na skutek aktualizacji, poprawiono wyświetlanie statystyk dotyczących przesyłu połączeń IPsec VPN, również skorygowano polecenie diagnostyczne ,,diagnose hardware info’’, gdzie dane dotyczące zasilania PSU były błędnie wyświetlane. Po więcej ciekawych informacji zapraszamy do dalszej części posta.

Aktualnie wspierane modele:

FortiGate FG-40F, FG-40F-3G4G, FG-60E, FG-60E-DSL, FG-60E-DSLJ, FG-60E-POE, FG-60F, FG-61E, FG-61F, FG-80E, FG-80E-POE, FG-80F, FG-80F-BP, FG-80F-POE, FG-81E, FG-81E-POE, FG-81F, FG-81F-POE, FG-90E, FG-91E, FG-100E, FG-100EF, FG-100F, FG-101E, FG-101F, FG-140E, FG-140E-POE, FG-200E, FG-200F, FG-201E, FG-201F, FG-300E, FG-301E, FG‑400E, FG-400E-BP, FG‑401E, FG‑500E, FG-501E, FG-600E, FG-601E, FG-800D, FG‑900D, FG-1000D, FG-1100E, FG-1101E, FG‑1200D, FG-1500D, FG-1500DT, FG-1800F, FG-1801F, FG-2000E, FG-2200E, FG-2201E, FG-2500E, FG-2600F, FG-2601F, FG-3000D, FG-3100D, FG‑3200D, FG-3300E, FG-3301E, FG-3400E, FG-3401E, FG-3500F, FG-3501F, FG-3600E, FG-3601E, FG-3700D, FG-3800D, FG-3960E, FG‑3980E, FG-4200F, FG-4201F, FG-4400F, FG-4401F, FG-5001E, FG‑5001E1
FortiWiFi FWF-40F, FWF-40F-3G4G, FWF-60E, FWF-60E-DSL, FWF-60E-DSLJ, FWF-60F, FWF-61E, FWF-61F, FWF-80F-2R, FWF-81F-2R, FWF-81F-2R-POE, FWF-81F-2R-3G4G-POE
FortiGate Rugged FGR-60F, FGR-60F-3G4G
FortiGate VM FG-ARM64-AWS, FG-ARM64-KVM, FG-ARM64-OCI, FG-VM64, FG-VM64-ALI, FG-VM64-AWS, FG-VM64-AZURE, FG‑VM64‑GCP, FG-VM64-HV, FG-VM64-IBM, FG-VM64-KVM, FG‑VM64‑OPC, FG‑VM64-RAXONDEMAND, FG-VM64-SVM, FG-VM64-VMX, FG-VM64-XEN
Pay-as-you-go images FOS-VM64, FOS-VM64-HV, FOS-VM64-KVM, FOS-VM64-XEN

Rozwiązane problemy:

Anti Virus

Bug ID Description
727067 FortiGate should fix the interface between FortiGate and FortiAnalyzer for the CDR file.
795784 Able to bypass FortiOS AV inspection on email traffic when manipulating a MIME attachment with junk and pad characters in Base64.
800731 Flow AV sends HTML files to the FortiGate Cloud Sandbox every time when HTML is not configured in file list.
805655 A scanunit crash with signal 11 occurs for SMTP and QP encoding.

DNS Filter

Bug ID Description
790974 When the DNS static domain filter entry’s action set to allow, it skips DNS translation.
800497 In flow mode with set status disable in the static domain filter, the entry still works when enabled in the DNS filter.

Endpoint Control

Bug ID Description
775742 Upgrade EMS tags to include classification and severity to guarantee uniqueness.
803198 Intermittent FortiOS failure when using a redundant EMS configuration because the EMS FQDN was resolved once before, and when DNS entry expires or the DNS is used for load balancing.
817140 Device is constantly unauthorized in EMS when using set interface-select-method sdwan.

Explicit Proxy

Bug ID Description
794124 HTTPS websites are not accessible if certificate-inspection is set in a proxy policy.
803228 When converting an explicit proxy session to SSL redirect and if this session already has connected to an HTTP server, the WAD crashes continuously with signal 11.
816879 Explicit proxy is not working when certificate inspection is enabled.

Firewall

Bug ID Description
677855 cmdbsrv and other processes take CPU resources upon every configuration change in devices with over ten thousand firewall policies.
773035 Custom services name is not displayed correctly in logs with a port range of more than 3000 ports.
784766 Virtual server for exchange is returning ERR_EMPTY_RESPONSE message.
800730 When using NGFW policy-based mode, modifying a security policy causes all sessions to be reset.
808264 Stress test shows packet loss when testing with flow inspection mode and application control.
815565 Unable to connect to the reserved management interface allowed by the local-in policy.
824091 Promethean Screen Share (multicast) is not working on the member interfaces of a software switch.
827780 ISDB source matching is inconsistent between transparent and NAT modes.
829071 Geolocation block on VIP object failed with seemly correct configuration.
829664 Kernel panic occurs while collecting the debug flow.
830823 Traffic is dropped intermittently by the implicit deny policy, even though there is a valid policy on the FortiGate.
832217 Traffic is hitting the implicit deny policy when changes are made to a policy.

FortiView

Bug ID Description
804177 When setting the time period to now filter, the table cannot be filtered by policy type.
811095 Threat type N/A – Static URL Filter is showing on sources that do not have the URL filter enabled.
819924 Information disappears after some time on the FortiView pages.

GUI

Bug ID Description
729406 New IPsec design tunnel-id still displays the gateway as an IP address, when it should be a tunnel ID.
749843 Bandwidth widget does not display traffic information for VLAN interfaces when a large number of VLAN interfaces are configured.
777145 Managed FortiSwitches page incorrectly shows a warning about an unregistered FortiSwitch even though it is registered. This only impacts transferred or RMAed FortiSwitches. This is only a display issue with no impact on the FortiSwitch’s operation.
794757 Inbound traffic on the interface bandwidth widget shows 0 bps on the VLAN interface.
798161 System > Certificates page keeps spinning when trying to access it from Safari.
802292 Logs sourced from FortiAnalyzer Big Data show the incorrect time.
804584 On the policy dialog page, the Select Entries box for the Service field does not list all service objects if an IPv6 address is in the policy.
807197 High iowait CPU usage and memory consumption issues caused by report runner.
819272 When a VLAN belongs to a zone, and the zone is used in a policy, editing the VLAN ID changes the policy’s position in the table.
825377 Managed FortiSwitches page, policy pages, and some FortiView widgets are slow to load.
833774 GUI needs to allow the members of the software switch interface to be used in IPv4/IPv6 multicast policy.

HA

Bug ID Description
722703 ISDB is not updating; last update attempt is stuck at an older date.
750829 In large customer configurations, some functions may time out, which causes an unexpected failover and keeps high cmdbsvr usage for a long time.
750978 Interface link status of HA members go down when cfg-revert tries to reboot post cfg-revert-timeout.
782734 Cluster is out-of-sync due to switch controller managed switch checksum mismatch.
785514 In some situations, the fgfmd daemon is blocked by a query to the HA secondary checksum, which causes the tunnel between the FortiManager and FortiGate to go down.
788702 Due to an HA port (Intel i40e) driver issue, not all SW sessions are synchronized to the secondary, so there is a difference.
803354 After HA-AP failover, the FortiExtender WAN interface of the new primary cannot get the LTE IP address from FortiExtender.
816883 High CPU usage on secondary device, and CPU lacks the AVX feature needed to load libdpdk.so.
817942 Secondary cluster member’s iprope traffic statistics are not updated to the original primary after an A-P HA failover.
819872 HA split brain scenario occurs after upgrading from 6.4.6 to 7.0.6, and HA heartbeats are lost followed by a kernel panic. Affected platforms: NP7 models.
822449 FGCP in standby sends GARP with physical MAC when it boots up.
823687 A cluster is repeatedly out-of sync due to external files (SSLVPN_AUTH_GROUPS) when there are frequent user logins and logouts.
824651 Certificate upload causes HA checksum mismatch.
826188 Secondary FortiGate FQDN is stuck in the queue, even if the primary FortiGate FQDN has already been resolved.
829390 When the internet service name management checksum is changed, it is out-of-sync when the auto-update is disabled on FortiManager.
830463 After shutting down the HA primary unit and then restarting it, the uptime for both nodes is zero, and it fails back to the former primary unit.

Hyperscale

Bug ID Description
804742 After changing hyperscale firewall policies, it may take longer than expected for the policy changes to be applied to traffic. The delay occurs because the hyperscale firewall policy engine enhancements added to FortiOS 7.0.6 may cause the FortiGate to take extra time to compile firewall policy changes and generate a new policy set that can be applied to traffic by NP7 processors. The delay is affected by hyperscale policy set complexity, the total number of established sessions to be re-evaluated, and the rate of receiving new sessions.
805846 In the FortiOS MIB files, the trap fields fgFwIppStatsGroupName and fgFwIppStatsInusePBAs have the same OID. As a result, the fgFwIppStatsInusePBAs field always returns a value of 0.
810025 Using EIF to support hairpinning does not work for NAT64 sessions.
810379 Creating an access control list (ACL) policy on a FortiGate with NP7 processors causes the npd process to crash.
812833 FortiGate still holds npu-log-server related configuration after removing hyperscale license.
812844 Default static route does not work well for hypsercale VDOM.
836474 Changes in the zone configuration are not updated by the NPD on hyperscale.
837270 Disabling Block intra-zone traffic in a zone does not allow TCP/UDP traffic between interfaces of a zone.

ICAP

Bug ID Description
832515 Bad gateway occurs using ICAP with explicit proxy under traffic load.

Intrusion Prevention

Bug ID Description
695464 High IPS engine CPU usage due to recursive function call.
755859 The IPS sessions count is higher than system sessions, which causes the FortiGate to enter conserve mode.
771000 High CPU in all cores with device running with one interface set as a one-arm sniffer.
798961 High CPU usage occurs on all cores in system space in __posix_lock_file for about 30 seconds when updating the configuration or signatures.
809691 High CPU usage on IPS engine when certain flow-based policies are active.

IPsec VPN

Bug ID Description
757696 Implementing the route-overlap setting on phase 2 configurations brings tunnels down until a reboot is not performed on the FGSP cluster.
763205 IKE crashes after HA failover when the enforce-unique-id option is enabled.
765868 The packets did not pass through QTM, and SYN packets bypass the IPsec tunnel once traffic is offloaded. Affected platforms: NP7 models.
778243 When net-device is enabled on the hub, the tunnel interface IP is missing in the routing table.
778974 BGP route is inactive in the routing table after the hub’s IPsec tunnel binding interface bounces.
787949 FortiGate sends duplicate SNMP traps if the tunnel is brought down on the local side.
790486 Support IPsec FGSP per tunnel failover.
798045 FortiGate is unable to install SA (failed to add SA, error 22) when there is an overlap in configured selectors.
805301 Enabling NPU offloading in the phase 1 settings causes a complete traffic outage after a couple of ping packets pass through.
807086 ADVPN hub randomly initiates secondary tunnel to spoke, causing spoke to drop tunnel traffic for RPF check fail.
810988 GUI does not allow IP overlap for a tunnel interface when allow-subnet-overlap is enabled (CLI allows it).
814366 There are no incoming ESP packets from the hub to spoke after upgrading.
815253 NP7 offloaded egress ESP traffic that was not sent out of the FortiGate.
815969 Cannot apply dialup IPsec VPN settings modifications in the GUI when net-device is disabled.
824532 IPsec learned route disappears from the routing table.
825523 NP7 drops outbound ESP after IPsec VPN is established for some time.
827350 Dialup selector routes are not deleted after iked crash.
828467 The iked process is constantly crashing.
830252 IPsec VPN statistics are not increasing on the device.
836260 The IPsec aggregate interface does not appear in the Interface dropdown when configuring the Interface Bandwidth widget.

Limitations

Bug ID Description
799831 Hyperscale fixed allocation CGN client is limited to 65 thousand addresses, and the CGN start port might be ignored.

Log & Report

Bug ID Description
790893 Logging filters do not work as expected.
814427 FortiGate error in FortiAnalyzer connectivity test on secondary device after upgrade.
814758 Get an intermittent error when running execute log fortianalyzer-cloud test-connectivity.
821359 FortiGate appears to have a limitation in the syslogd filter configuration.
821494 Forward traffic logs intermittently fail to show the destination hostname.
837435 Syslogd failed to send logs for some log IDs, including traffic log IDs 3, 4, 5, 6, 7, and 11.

Proxy

Bug ID Description
745701 An issue occurs with TLS 1.3 and the 0RTT process where Firefox cannot access https.google.com using proxy-based UTM with certification inspection.
768278 WAD crashes frequently, authentication stops, and firewall freezes once proxy policy changes are pushed out.
780182 WAD crash at wad_http_fwd_msg_body.
793651 An expired certificate can be chosen when creating an SSL/SSH profile for deep inspection.
795360 Apple push notification service fails with proxy-based inspection.
799237 WAD crash at wad_http_srv_cancel when the TLS/SSL renegotiation encounters an error.
799381 WAD crash at wad_ssl_proxy_caps_on_clt_certs when TLS 1.2 receives the client certificate, and that server facing SSL port has been closed due to SSL bypass.
800125 Even if the policy is set to deny FTP_PUT, file uploads are permitted when the UTM feature is enabled.
803286 Inspecting all ports in deep inspection is dependent on previous protocol port mapping settings.
803380 Device is consuming high memory and going in conserve mode, possible due to a WAD memory leak.
807332 WAD does not forward the 302 HTTP redirect to the end client.
807431 File from AWS S3 fails to download with UTM, deep inspection, and proxy configured.
808831 Upgrading to 7.0.5 broke IM controls and caused Zalo chat file transfer issues.
809346 FTPS helper is not opening pinholes for expected traffic for non-standard ports.
811259 WAD memory leak occurs with IPS enabled.
813562 The wad_m_usr_info frees count is sometimes larger than the allocs count.
815313 WAD crash at wad_ssl_cert_check_auth_status once during stress testing.
822271 Unable to access a website when deep inspection is enabled in a proxy policy.
823247 WAD user_info process leaks memory.
825496 Explicit proxy traffic is terminated when IPS is enabled. The exact failure happened upon certificate inspection.
830166 WAD crash signal 11 occurs.
830450 WAD crash at wad_p2s_ciphers_filter.
830907 WAD crash at wad_mem_c_malloc.cold.
834314 ICAP client timeout issue causes WAD signal 11 crash after upgrading to 7.0.6 from 6.4.
837724 WAD crash at wad_port_general_update_dctx.

REST API

Bug ID Description
836760 The start parameter has no effect with the /api/v2/monitor/user/device/query API call.

Routing

Bug ID Description
756955 Routing table does not reflect the new changes for the static route until the routing process is restarted when cmdbsrv and other processes take CPU resources upon every configuration change in devices with over ten thousand firewall policies.
769330 Traffic does not fail over to alternate path upon interface being down (FGR-60F in transparent mode).
774136 VPN traffic is not being metered by DoS policy when using SD-WAN.
779113 A new route check to make sure the route is removed when the link-monitor object fails on ARM based platforms.
795213 On the Network > SD-WAN page, adding a named static route to an SD-WAN zone creates a default blackhole route.
796070 Incorrect SD-WAN kernel routes are used on the secondary device.
796409 GUI pages related to SD-WAN rules and performance SLA take 15 to 20 seconds to load.
805285 SIP-RTP fails after a route or interface change.
806939 Routing issue with ADVPN and SD-WAN if IPsec aggregate interfaces are configured.
808840 After cloning a static route, the URL gets stuck with "clone=true".
812982 SD-WAN performance SLAs on a dialup IPsec VPN tunnel do not work as expected.
822659 Secure SD-WAN Monitor in FortiAnalyzer does not show graphs when the SLA target is not configured in SD-WAN performance SLA.
823293 Disabling BFD causes an OSPF flap/bounce.
826797 When a dynamic address fails, it becomes 0.0.0.0/0 in the SD-WAN rule.
828121 In a BGP neighbor, the allowas-in 0 value is confusing and not accepted by the GUI for validation (1-10 required).
828345 Wrong MAC address is in the ARP response for VRRP IP instead of the VRRP virtual MAC.
830254 When changing interfaces from dense mode to sparse mode, and then back to dense mode, the interfaces did not show up under dense mode.

Security Fabric

Bug ID Description
800986 A downstream FortiGate is sending the config rusted-list to FortiManager in the auto update.
803600 Automation stitch for a scheduled backup is not working.
814796 The threat level threshold in the compromised host trigger does not work.
815984 Azure SDN connector has a 403 error when the AZD restarts.
822015 Unable to resolve dynamic address from ACI SDN connector on explicit web proxy.

SSL VPN

Bug ID Description
626311 SSL VPN users are remaining logged on past the auth-timeout value.
676278 Custom host check AV and firewall for macOS fails for FortiClient SSL VPN.
697142 SharePoint server (de***.sc***.gov.sa) is not working on web-based VPN.
767832 After upgrading from 6.4.7 to 7.0.1, the Num Lock key is turned off on the SSL VPN webpage.
780765 High CPU usage in SSL VPN using libssh2.
784426 SSL VPN web mode has problems accessing ComCenter websites.
786056 VNC using SSL VPN web mode disconnects after 10 minutes.
789642 Unable to load Grafana application through SSL VPN web mode.
796768 SSL VPN RDP is unable to connect to load-balanced VMs.
799308 SSL VPN bookmark is not working.
805922 Unable to configure ssl.root as the associated-interface in a firewall address.
807268 Many SSL VPN users are disconnected periodically, and sslvpnd crashes.
809209 SSL VPN process memory leak is causing the FortiGate to enter conserve mode over a short period of time.
809473 When sslvpnd debugs are enabled, the SSL VPN process crashes more often.
810715 Web application is not loading in the SSL VPN web mode.
811007 The auto-generated URL on the VPN > SSL-VPN Settings page shows the management IP of the FortiGate instead of the SSL VPN interface port IP as defined on the VPN > SSL-VPN Realms page when a realm is created.
811492 SSL VPN should not leak information while performing Telnet.
814040 SSL VPN bookmark configuration is added automatically after client logs in to web mode.
814708 The same SAML user failed to establish a tunnel when a stale web session exists with limit-user-logins enabled.
816716 sslvpnd crashed when deleting a VLAN interface.
816881 TX packet loss on ssl.root interface.
817843 Logging out of SSL VPN tunnel mode does not clear the authenticated list.
818196 SSL VPN does not work properly after reconnecting without authentication and a TX drop is found.
819296 GUI should not use <server_ip> as a sender to send the SSL VPN configuration (it should use value set in reply-to).
823054 Internal website with JavaScript lacks some menus in SSL VPN web mode.
829955 When using SSL VPN to do auto-reconnect without authentication, it always fails the second time it tries to reconnect.
834713 Getting re-authentication pop-up window for VNC quick connection over SSL VPN web proxy.
841705 SSL VPN web mode access is not working for specific configured URLs.

Switch Controller

Bug ID Description
794026 FortiGates quarantines are stuck at 256.
803307 The Enable STP security control description should be reworded to mention that Edge ports should have STP enabled once the network topology is stable.
805154 Switch controller preconfiguration of FortiSwitch 108F-POE is incorrect.
810550 Send DHCP/ARP packet failed, and get errno = 6 in log when config-sync runs.
836604 The 40000cr4 port speed is not available under the switch-controller managed-switch port speed settings.

System

Bug ID Description
675558 SFP port with 1G copper SFP always is up.
686135 The dnp process goes to 100% CPU usage as soon as the configuration is downloaded via SCP. Affected platforms: FGR-60F and FGR-60F-3G4G.
709679 Get can not set mac address(16) message after downgrading.
713951 Not all ports are coming up after an LAG bounce on 8 × 10 GB LAG with ASR9K. Affected platforms: FG-3960E and FG-3980E.
748409 Client traffic from VLAN to VXLAN encapsulation traffic is failing after upgrading.
751715 Random LTE modem disconnections due to certain carriers getting unstable due to WWAN modem USB speed under super-speed.
751870 User should be disallowed from sending an alert email from a customized address if the email security compliance check fails.
764954 FortiAnalyzer serial number automatically learned from miglogd does not send it to FortiManager through the automatic update.
780315 Poor CPS performance with VLAN interfaces in firewall only mode (NP7 and NP6 platforms).
781960 A dhcpd crash log occurs.
783939 IPv4 session is flushed after creating a new VDOM.
787144 FortiExtender virtual interface on the FortiGate is not receiving the IP address when mapping FortiExtender to it.
787595 FFDB cannot be updated with exec update-now or execute internet-service refresh after upgrading the firmware in a large configuration.
787929 Deleting a VDOM that contains EMAC interfaces might affect the interface bandwidth widget of the parent VLAN.
789153 A profile with higher privileges than the user’s own profile can be set.
797428 SNMP status for NPU is not available on NP6xlite.
798091 After upgrading from 6.4.9 to 7.0.5, the FG-110xE’s 1000M SFP interface may fail to auto-negotiate and cannot be up due to the missed auto-negotiation.
798303 The threshold for conserve mode is lowered.
800294 Interface migration wizard fails to migrate interfaces when VLANs have dependencies within dependencies.
800615 After a device reboot, the modem interface sometimes does not have a stable route with the local carrier.
801040 Session anomaly was incorrectly triggered though concurrent sessions on the FortiGate that were below the configured threshold.
801053 FG-1800F existing hardware switch configuration fails after upgrading.
801474 DHCP IP lease is flushed within the lease time.
805122 In FIPS-CC mode, if cfg-save is set to revert, the system will halt a configuration change or certificate purge.
805345 In some cases, the HA SNMP OID responds very slowly or does work correctly.
805412 DHCPv6 authentication option offer is not accepted from the server.
807947 Unable to create new interface and VDOM link with names that contain spaces.
809030 Traffic loss occurs when running SNAT PBA pool in a hyperscale VDOM. The NP7 hardware module PRP got stuck, which caused the NP7 to hang.
810104 Under certain trace condition scenarios, a kernel panic may be triggered on new kernel platforms after failover with HTTP CCS followed by SIP64 traffic.
810466 EHP and HRX drop on NP6 FortiGate, causing low throughput.
810583 Running diagnose hardware deviceinfo psu shows the incorrect PSU slot.
810879 DoS policy ID cannot be moved in GUI and CLI when enabling multiple DoS policies.
811350 Packets drop when the standby device is turned on.
811367 Ports 33-35 constantly show suspect messaging in the transceiver output. Affected platforms: FG-2600F and FG-2601F.
811449 New DNS system servers with DoT enabled, applying a DNS filter to the FortiGate DNS server fails.
812499 When traffic gets offloaded, an incorrect MAC address is used as a source.
813223 Random kernel panic occurs due to calling timer_setup.
813606 DHCP relay offers to iPhones is blocked by the FortiGate.
815360 NP7 platforms may encounter a kernel panic when deleting more than two hardware switches at the same time.
815692 Slow upload speeds when connected to FIOS connection. Affected platforms: NP6Lite and NP6xLite.
816278 Memory increase due to iked process.
816385 When creating an inner VLAN CAPWAP interface or sending inner VLAN traffic when the FortiGate is rebooting/upgrading from capwap-offload disable status, these actions trigger a freeze. Affected platforms: NP7 models.
816823 NP6xLite test failed when running diagnose hardware test pci.
818461 When an aggregate is created after all VLANs and added to a software switch, all VLANs are lost after rebooting.
819460 There is no 1000auto option under the ports. Affected platforms: FG-110xE.
819640 SSH public key changes after every reboot.
821366 PPPoE is not working on FG-60E wan2 interface.
823589 When pushing a script from FortiManager to FortiGate, FortiOS will sometimes send the CLI change to FortiManager with the FGFM API. If the tunnel is not up, the session will not exist and it causes a code crash.
824464 CMDB checksum is not updated when a certificate is renewed over CMP, causing a FortiManager failure to synchronize with the certificate.
826440 Null pointer causing kernel crash on FWF-61F.
829598 Constant increase (3%-4%) in memory occurs everyday.
830415 FEX-40D-NAM model support was removed after upgrading to 7.0.6 or 7.0.7.
832948 Signature updating from FortiManager does not work after cloud communication is disabled.
834138 Kernel panic occurs due to VXLAN.
834414 When the uplink modem is restarted, the FortiGate interface configured as PPPoE is unable to obtain an IP address.
834641 Unable to remove DDNS entry frequently, even if the DDNS setting is disabled.
834762 Kernel panics occurs on secondary HA node on NP7 models (7.0.6).
836049 Unexpected device reboots with the kernel panic error on NP7 models.
837110 Burst in multicast packets is causing high CPU usage on multiple CPU cores.
839190 Running get system auto-update versions causes newcli to crash and the prints quit at the MAC address database.
840175 Random kernel panic occurs and causes the device to reboot.

Upgrade

Bug ID Description
803041 Link lights on the FG-1100E fail to come up and are inoperative after upgrading.
803171 Upgrade takes longer than expected, and get daemon_bits=0x00000040 error when HA upgrades.

User & Authentication

Bug ID Description
749694 A fnbamd crash is caused by an LDAP server being unreachable.
813407 Captive portal authentication with RADIUS user group truncates the token code to eight characters.
822684 When multiple FSSO CA connections are configured at the same time, only the last configured FSSO connection comes up.
825505 Devices are lost in Users & Devices widget after a period of time (around two days) in configurations with FortiSwitch, FortiAP, and DHCP.
825759 The Device detection option is missing in the GUI for redundant interfaces (CLI is OK).
833802 RADIUS re-authentication is not following RFC 2865 standards.

VM

Bug ID Description
786278 Bandwidth usage is not shown when DPDK is enabled.
793914 HA is not in sync when a dynamic AWS service SMTP address object is retrieving a dynamic update from AWS.
798717 Traffic/session logging incorrectly refers to SR-IOV secondary interfaces when the Rx is from fast path.
803219 Azure SDN connector might miss dynamic IP addresses due to only the first page of the network interface being processed.
809963 Get cmdbsvr crash on FG-KVM32 after running concurrent performance test.
820457 Dynamic address objects are removed after Azure API call failed and caused legitimate traffic drop.
825464 Every time the FortiGate reboots, the certificate setting reverts to self-sign under config system ftm-push.

WAN Optimization

Bug ID Description
804662 WANOpt tunnels are not established for traffic matching the profile.

Web Application Firewall

Bug ID Description
817673 Problem accessing some web servers when WAF and AV are enabled in same policy (proxy inspection mode).

Web Filter

Bug ID Description
789804 Web filter configured to restrict YouTube access does not work.
816781 FGSP cluster with UTM blocks websites when NTurbo or offloading is enabled.

WiFi Controller

Bug ID Description
790367 FWF-60F has kernel panic and reboots by itself every few hours.
796036 Manual quarantine for wireless client connected to SSID on multi-VDOM with wtp-share does not work.
807605 FortiOS exhibits segmentation fault on hostapd on the secondary controller configured in HA.
807713 FortiGate is not sending RADIUS accounting message consistently to RADIUS server for wireless SSO.
809623 CAPWAP traffic is dropped when capwap-offloading is enabled.
811953 Configuration installation from FortiManager breaks the quarantine setting, and the VAP becomes undeletable.
821803 Wireless multicast traffic causes the cw_acd process to have high CPU usage and triggers a hostapd crash.
824441 Suggest replacing the IP Address column with MAC Address in the Collected Email widget.
827902 CAPWAP data traffic over redundant IPsec tunnels failing when the primary IPsec tunnel is down (failover to backup tunnel).
831932 The cw_acd process crashes several times after the system enters conserve mode.

Common Vulnerabilities and Exposures

Visit https://fortiguard.com/psirt for more information.

Bug ID CVE references
846234 FortiOS 7.0.8 is no longer vulnerable to the following CVE Reference:

  • CVE-2022-40684
846854 FortiOS 7.0.8 is no longer vulnerable to the following CVE Reference:

  • CVE-2022-40684

Notatki producenta: FortiOS 7.0.78

Pozdrawiamy,

Zespół B&B
Bezpieczeństwo w biznesie

Post Views: 1 390

7.0.8 FortiGate FortiGate 7.0.8 FortiOS FortiOS 7.0.8

Poprzedni artykułVMware ESXi 8.0 / VMware vCenter Server 8.0Następny artykuł FortiAP 7.0.5

Najnowsze

FortiAnalyzer 7.6.38 maja 2025
FortiManager 7.6.330 kwietnia 2025
FortiMail 7.6.322 kwietnia 2025

Kategorie

  • Acronis
  • Aktualności
  • Bez kategorii
  • ESET
  • F-Secure
  • FortiAnalyzer
  • FortiAP
  • FortiAuthenticator
  • FortiClient
  • FortiDeceptor
  • FORTIGATE
  • FORTIMAIL
  • FortiManager
  • FortiNAC
  • FortiSIEM
  • FORTISWITCH
  • FortiWeb
  • NAKIVO
  • Proget
  • Qnap
  • Stormshield
  • Szkolenia
  • Veeam
  • VMware
  • WithSecure

Tagi

6.0.6 6.2.2 6.2.7 6.4.0 6.4.4 6.4.5 6.4.8 7.0.0 7.0.2 7.0.5 7.2.0 7.2.2 ems Eset eset endpoint antivirus eset endpoint security ESET Inspect ESET Protect ESET Protect Cloud F-Secure FMG FortiAnalyzer forti analyzer FortiAP fortiap-w2 FortiAuthenticator FortiClient FortiClientEMS forticlient ems FortiGate FortiMail FortiManager FortiNAC Fortinet FortiOS FortiSIEM FortiSwitch FortiWeb vCenter vCenter Server VMware VMware ESXi vmware esxi 8.0 vmware vcenter VMware vCenter Server

MENU

  • Start
  • O nas
  • Produkty
  • Usługi
    • Szkolenia
    • Cyberbezpieczny Samorząd
    • Audyt bezpieczeństwa informacji
      • Testy penetracyjne
      • Testy ataków socjotechnicznych
    • Audyt konfiguracji Fortigate
    • Prezentacje
    • Wdrożenia
  • Blog techniczny
  • Pomoc
  • Kariera
  • Kontakt

BLOG TECHNICZNY

FortiAnalyzer 7.6.38 maja 2025
FortiManager 7.6.330 kwietnia 2025
FortiMail 7.6.322 kwietnia 2025

KONTAKT

biuro@b-and-b.plhttps://www.b-and-b.pl
8:00-16:00
RODO | POLITYKA PRYWATNOŚCI
OGÓLNE WARUNKI REKLAMACJI

BEZPIECZEŃSTWO W BIZNESIE 2025 - wszystkie prawa zastrzeżone

MENU

  • Start
  • O nas
  • Produkty
  • Usługi
    • Szkolenia
    • Cyberbezpieczny Samorząd
    • Audyt bezpieczeństwa informacji
      • Testy penetracyjne
      • Testy ataków socjotechnicznych
    • Audyt konfiguracji Fortigate
    • Prezentacje
    • Wdrożenia
  • Blog techniczny
  • Pomoc
  • Kariera
  • Kontakt

BLOG TECHNICZNY

FortiAnalyzer 7.6.38 maja 2025
FortiManager 7.6.330 kwietnia 2025
FortiMail 7.6.322 kwietnia 2025

Kontakt

+48 500-413-313
biuro@b-and-b.pl
8:00-16:00
Add new entry logo

Korzystamy z plików cookies lub podobnych technologii, by lepiej dopasować treści na stronie do Twoich potrzeb. W każdej chwili możesz zmienić ustawienia cookies. Polityka prywatności

Akceptuję Odmów
Cookies are small text files that can be used by websites to make a user's experience more efficient. The law states that we can store cookies on your device if they are strictly necessary for the operation of this site. For all other types of cookies we need your permission. This site uses different types of cookies. Some cookies are placed by third party services that appear on our pages.
  • Always Active
    Necessary
    Necessary cookies help make a website usable by enabling basic functions like page navigation and access to secure areas of the website. The website cannot function properly without these cookies.

  • Marketing
    Marketing cookies are used to track visitors across websites. The intention is to display ads that are relevant and engaging for the individual user and thereby more valuable for publishers and third party advertisers.

  • Analytics
    Analytics cookies help website owners to understand how visitors interact with websites by collecting and reporting information anonymously.

  • Preferences
    Preference cookies enable a website to remember information that changes the way the website behaves or looks, like your preferred language or the region that you are in.

  • Unclassified
    Unclassified cookies are cookies that we are in the process of classifying, together with the providers of individual cookies.