B&B Bezpieczeństwo w biznesie
  • Start
  • O nas
  • Produkty
  • Usługi
    • Szkolenia
    • Cyberbezpieczny Samorząd
    • Audyt bezpieczeństwa informacji
      • Testy penetracyjne
      • Testy ataków socjotechnicznych
    • Audyt konfiguracji Fortigate
    • Prezentacje
    • Wdrożenia
  • Blog techniczny
  • Pomoc
  • Kariera
  • Kontakt

Fortinet udostępnił aktualizację dla produktu FortiOS o numerze wersji 7.2.5. Nowa wersja systemu rozwiązuje problemy z podatnościami CVE-2023-29179, CVE-2023-29181, CVE-2023-29180, CVE-2023-27997, CVE-2023-29178 oraz CVE-2022-43953, które dotyczą problemów z eskalacją uprawnień, zdolności do wykonywania zdalnego kodu,ujawnienia poufnych informacji czy też awarii usługi. Więcej informacji w poniższym artykule.

Wspierane modele:

FortiGate FG-40F, FG-40F-3G4G, FG-60E, FG-60E-DSL, FG-60E-DSLJ, FG-60E-POE, FG-60F, FG-61E, FG-61F, FG-70F, FG-71F, FG-80E, FG-80E-POE, FG-80F, FG-80F-BP, FG-80F-POE, FG-81E, FG-81E-POE, FG-81F, FG-81F-POE, FG-90E, FG-91E, FG-100E, FG-100EF, FG-100F, FG-101E, FG-101F, FG-140E, FG-140E-POE, FG-200E, FG-200F, FG-201E, FG-201F, FG-300E, FG-301E, FG‑400E, FG-400E-BP, FG‑401E, FG-400F, FG-401F, FG‑500E, FG-501E, FG-600E, FG-601E, FG-600F, FG-601F, FG-800D, FG‑900D, FG-1000D, FG-1100E, FG-1101E, FG-1500D, FG-1500DT, FG-1800F, FG-1801F, FG-2000E, FG-2200E, FG-2201E, FG-2500E, FG-2600F, FG-2601F, FG-3000D, FG-3000F, FG-3001F, FG-3100D, FG‑3200D, FG-3300E, FG-3301E, FG-3400E, FG-3401E, FG-3500F, FG-3501F, FG-3600E, FG-3601E, FG-3700D, FG-3960E, FG‑3980E, FG-4200F, FG-4201F, FG-4400F, FG-4401F, FG-5001E, FG‑5001E1, FG-6000F, FG-7000E, FG-7000F
FortiWiFi FWF-40F, FWF-40F-3G4G, FWF-60E, FWF-60E-DSL, FWF-60E-DSLJ, FWF-60F, FWF-61E, FWF-61F, FWF-80F-2R, FWF-81F-2R, FWF-81F-2R-POE, FWF-81F-2R-3G4G-POE
FortiGate Rugged FGR-60F, FGR-60F-3G4G, FGR-70F, FGR-70F-3G4G
FortiFirewall FFW-3980E, FFW-VM64, FFW-VM64-KVM
FortiGate VM FG-ARM64-AWS, FG-ARM64-AZURE, FG-ARM64-GCP, FG-ARM64-KVM, FG-ARM64-OCI, FG-VM64, FG-VM64-ALI, FG-VM64-AWS, FG-VM64-AZURE, FG‑VM64‑GCP, FG-VM64-HV, FG-VM64-IBM, FG-VM64-KVM, FG‑VM64‑OPC, FG‑VM64-RAXONDEMAND, FG-VM64-SVM, FG-VM64-VMX, FG-VM64-XEN
Pay-as-you-go images FOS-VM64, FOS-VM64-HV, FOS-VM64-KVM, FOS-VM64-XEN

FortiGate 6000 and 7000 support

FortiOS 7.2.5 supports the following FG-6000F, FG-7000E, and FG-7000F models:

FG-6000F FG-6300F, FG-6301F, FG-6500F, FG-6501F
FG-7000E FG-7030E, FG-7040E, FG-7060E
FG-7000F FG-7081F, FG-7121F

Rozwiązane problemy:

Bug ID Description
857911 The Anti-Spam Block/Allow List Entry dialog page is not showing the proper Type values in the dropdown.
877613 Mark as Reject can be still chosen as an Action in an Anti-Spam Block/Allow List in the GUI.

Anti Virus

Bug ID Description
818092 CDR archived files are deleted at random times and not retained.
849020 FortiGate enters conserve mode and the console prints a fork() failed message.
851706 Nothing is displayed in the Advanced Threat Protection Statistics dashboard widget.
863461 Scanunit displays unclear warnings when AV package validation fails.
869398 FortiGate sends too many unnecessary requests to FortiSandbox and causes high resource usage.
895950 Critical log message, Fortigate mmdb signature is missing, is generated on a unit without an AVDB contract.

Application Control

Bug ID Description
857632 Unable to access to some websites when application control with deep inspection is enabled.

DNS Filter

Bug ID Description
871854 DNS UTM log still presents unknown FortiGuard category even when the DNS proxy received a rating value.
878674 Forward traffic log is generated for allowed DNS traffic if the DNS filter is enabled but the policy is set to log security events only.

Explicit Proxy

Bug ID Description
842016 Client gets 304 response if a cached object has varying headers and is expired.
849794 Random websites are not accessible with proxy policy after upgrading to 6.4.10.
865135 Multipart boundary parsing failed with CRLF before the end of boundary 1.
875736 The proxy-re-authentication-mode option has been removed in 7.2.4 and is replaced with proxy-keep-alive-mode re-authentication. The new proxy-re-authentication-time timer is associated with this re-authentication mode. There are two unresolved issues:

  • After upgrading, the previously configured proxy-auth-timeout value for the absolute re-authentication mode is not preserved in the new proxy-re-authentication-time.
  • The new proxy-re-authentication-time is currently configured in seconds, but it should be configured in minutes to be consistent with other related authentication timers (such as proxy-auth-timeout).
880361 Transparent web proxy policy has no match if the source or destination interface is the same and member of SD-WAN.
901239 Multiple WAD crashes after upgrading firmware to 7.2.4.
901614 Firewall schedule does not work as expected with a proxy policy.

Firewall

Bug ID Description
719311 On the Policy & Objects > Firewall Policy page in 6.4.0 onwards, the IPv4 and IPv6 policy tables are combined but the custom section name (global label) is not automatically checked for duplicates. If there is a duplicate custom section name, the policy list may show empty for that section. This is a display issue only and does not impact policy traffic.
770541 Within the Policy & Objects menu, the firewall, DoS, and traffic shaping policy pages take around five seconds to load when the FortiGate cannot reach the FortiGuard DNS servers.
804603 An httpsd singal 6 crash occurs due to /api/v2/monitor/license/forticare-resllers.
816493 The set sub-type ems-tag option is blocked in HA diff installation.
835413 Inaccurate sFlow interface data reported to PRTG after upgrading to 7.0.
840689 Virtual server aborts connection when ssl-max-version is set to tls-1.3.
851212 After traffic flow changes to FGSP peer from owner, iprope information for synchronized sessions does not update on the peer side.
854901 Full cone NAT (permit-any-host enable) causes TCP session clash.
856187 Explicit FTPS stops working with IP pool after upgrading.
860480 FG-3000D cluster kernel panic occurs when upgrading from 7.0.5 to 7.0.6 and later.
861990 Increased CPU usage in softirq after upgrading from 7.0.5 to 7.0.6.
864612 When the service protocol is an IP with no specific port, it is skipped to be cached and causes a protocol/port service name in the log.
865661 Standard and full ISDB sizes are not configurable on FG-101F.
872744 Packets are not matching the existing session in transparent mode.
875565 The policy or other cache lists are sometimes not freed in time. This may cause unexpected policies to be stored in the cache list.
884578 Virtual server stops working after upgrading to 7.2.4.
895962 Virtual server with the HTTP HOST method is crashing WAD.
897849 Firewall Policy list may show empty sequence grouping sections if multiple policies are sharing the same global-label.
912740 On a FortiGate managed by FortiManager, after upgrading to 7.4.0, the Firewall Policy list may show separate sequence grouping for each policy because the global-label is updated to be unique for each policy.

FortiGate 6000 and 7000 platforms

Bug ID Description
838036 Merge FortiGate 6000 and 7000 series platforms.
888873 The FortiGate 7000E and 7000F platforms do not support GTP and PFCP load balancing.
902545 Unable to select a management interface LAG to be the direct SLBC logging interface.
905692 On a FortiGate 6000 or 7000, the active worker count returned by the output of diagnose sys ha dump-by group can be incorrect after an FPC or FPM goes down.
905788 Unable to select a management interface LAG to be the FGSP session synchronization interface.

FortiView

Bug ID Description
838652 The FortiView Sessions monitor displays VDOM sessions from other VDOMs.
892798 WAD is crashing and CPU memory is spiking when loading FortiView.

GUI

Bug ID Description
440197 On the System > FortiGuard page, the override FortiGuard server for AntiVirus & IPS Updates shows an Unknown status, even if the server is working correctly. This is a display issue only; the override feature is working properly.
677806 On the Network > Interfaces page when VDOM mode is enabled, the Global view incorrectly shows the status of IPsec tunnel interfaces from non-management VDOMs as up. The VDOM view shows the correct status.
699508 When an administrator ends a session by closing the browser, the administrator timeout event is not logged until the next time the administrator logs in.
722358 When a FortiGate local administrator is assigned to more than two VDOMs and tries logging in to the GUI console, they get a command parse error when entering VDOM configuration mode.
753328 Incorrect shortcut name shown on the Network > SD-WAN > Performance SLAs page.
807197 High iowait CPU usage and memory consumption issues caused by report runner.
820909 On the Policy & Objects > Schedules page, when the end date of a one-time schedule is set to the 31st of a month, it gets reset to the 1st of the same month.

Workaround: use CLI to set schedules with an end date of 31st.

821030 Security Fabric root FortiGate is unable to resolve firewall object conflicts in the GUI.
821734 Log & Report > Forward Traffic logs do not show the Policy ID if there is no Policy Name.
822991 On the Log & Report > Forward Traffic page, using the filter Result : Deny(all) does not work as expected.
827893 Security rating test for FortiCare Support fails when connected to FortiManager Cloud or FortiAnalyzer Cloud.
829736 Incorrect information is being displayed for the HA role on the System > HA page.
829773 Unable to load the Network > SD-WAN > SD-WAN Rules table sometimes due to a JavaScript error.
831439 On the WiFi & Switch Controller > SSIDs page, multiple DHCP servers for the same range can be configured on an interface if the interface name contains a comma (,) character.
837048 Unable to delete the LAN interface’s addresses without switching it back to a none-LAN role.
842079 On the System > HA page, a Failed to retrieve info caution message appears when hovering over the secondary unit’s Hostname. The same issue is observed on the Dashboard > Status > Security Fabric widget.
845513 On G-model profiles, changing the platform mode change from single 5G (dedicated scan enabled) to dual 5G is not taking effect.
853414 Policy and dashboard widgets do not load when the FortiGate manages a FortiSwitch with tenant ports (exported from root to other VDOM).
854529 The local standalone mode in a VAP configuration is disabled when viewing or updating its settings in the GUI.
861466 The Active Administrator Sessions widget shows the incorrect interface when accessing the firewall through the GUI.
862474 IPsec tunnel interface Bandwidth widget inbound is zero and outbound value is lower than the binding interface.
865956 On the Network > Policy Routes page, entries cannot be copied and pasted above or below.
866790 System > Firmware & Registration menu is not visible for administrator accounts without read-write permissions for the sysgrp-permission category.
867802 GUI always displays Access denied error after logging in.
869138 Unable to select addresses in FortiView monitors.
869828 An httpsd crash occurs when the GUI fails to get the disk log settings from the FortiGate.
870675 CLI console in GUI reports Connection lost. when the administrator has more than 100 VDOMs assigned.
874502 An access privilege prompt is not displayed when logging in to the GUI of a FortiGate managed by a FortiManager with post-login-banner enabled. The user is logged in with read-only permissions.
881678 On the Network > Routing Objects page, editing a prefix list with a large number of rule entries fails with an error notification that The integer value is not within valid range.
889647 CLI console disconnects and has '/tmp/daemon_debug/node_...' crash.
890531 Node.JS boots earlier than autod, which leads to a Node.JS crash.
890683 GUI being exposed to port 80 on the interfaces defined in the ACME settings, even if administrative access is disabled on the interface.
891895 When remotely accessing the FortiGate from FortiGate Cloud, the web GUI console displays Connection lost. Press Enter to start a new session.
897004 On rare occasions, the GUI may display blank pages when the user navigates from one menu to another if there is a managed FortiSwitch present.
899434 A super_admin login is logged in the console logs when remotely logging in to a FortiGate with the FortiCloud portal using a prof_admin profile.

HA

Bug ID Description
662978 Long lasting sessions are expired on HA secondary device with a 10G interface.
795443 The execute reboot script does not work in HA due to a HA failover before the script running is done.
826790 DHCP over IPsec is not working in an FGSP cluster.
843837 HA A-P virtual cluster information is not correctly presented in the GUI and CLI.
852308 New factory reset box failed to synchronize with primary, which was upgraded from 7.0.
853900 The administrator password-expire calculation on the primary and secondary returns a one-second diff, and causes HA to be out-of-sync.
854445 When adding or removing an HA monitor interface, the link failure value is not updated.
855841 In an HA A-P environment, an old administrator user still exists in the system after restoring the backup.
856004 Telnet connection running ping fails during FGSP failover for virtual wire pair with VLAN traffic.
856643 FG-500E interface stops sending IPv6 RAs after upgrading from 7.0.5 to 7.0.7.
860497 Output of diagnose sys ntp status is misleading when run on a secondary cluster member.
864226 FG-2600F kernel panic occurs after a failover on both members of the cluster.
868622 The session is not synchronized after HA failover by detecting monitored interface as down.
869557 Upgrading or re-uploading an image to the HA secondary node causes the OS to be un-certified.
870367 FGCP A-P devices get out of HA synchronization periodically due to FortiTokens being added and deleted.
872431 Primary FortiGate synchronizes the changing HA command to the secondary.
874823 FGSP session-sync-dev ports do not use L2 Ethernet frames but always use UDP, which reduces the performance.
876178 hasync crashing with signal 6 after upgrading to 7.2.3 from 7.0.7.
878173 When downloading the speed test server list, the HA cluster gets and stays out-of-sync.
885245 Unexpected failover occurs due to uptime, even if the uptime difference is less than the ha-uptime-diff-margin.
885844 HA shows as being out-of-sync after upgrading due to a checksum mismatch for endpoint-control fctems.

Hyperscale

Bug ID Description
804742 After changing hyperscale firewall policies, it may take longer than expected for the policy changes to be applied to traffic. The delay occurs because the hyperscale firewall policy engine enhancements added to FortiOS may cause the FortiGate to take extra time to compile firewall policy changes and generate a new policy set that can be applied to traffic by NP7 processors. The delay is affected by hyperscale policy set complexity, the total number of established sessions to be re-evaluated, and the rate of receiving new sessions.
807523 On NP7 platforms the config system npu option for nat46-force-ipv4-packet-forwarding is missing.
810366 Unrelated background traffic gets impacted when changing a policy where a hyperscale license is used.
824733 IPv6 traffic continues to pass through a multi-VDOM setup, even when the static route is deleted.
835697 Interface routes under DHCP mode remain in LPMD after moving the interface to another VDOM.
837270 Allowing intra-zone traffic is now supported in hyperscale firewall VDOMs. Options to block or allow intra-zone traffic are available in the GUI and CLI.
841712 On FortiGates licensed for hyperscale firewall features, the config system setting options nat46-force-ipv4-packet-forwarding and nat64-force-ipv6-packet-forwarding now also apply to NP7-offloaded traffic. The config system npu option nat46-force-ipv4-packet-forwarding has been removed.
877696 Get KTRIE invalid node related error and kernel panic on standby after adding a second device into A-P mode HA cluster.

Intrusion Prevention

Bug ID Description
839170 IPS engine may crash (SIGALRM)) when the system is busy because it might not receive enough run time.
842073 High CPU usage for more than 20 minutes and cmdb deadlock after FortiGuard update.
856837 When flow mode AV is enabled, IPS engine memory usage is higher with a large number of flow mode AV requests.
883600 Under config ips global, configuring set exclude-signatures none does not save to backup configuration.

IPsec VPN

Bug ID Description
699973 IPsec aggregate shows down status on Interfaces, Firewall Policy, and Static Routes configuration pages.
726326, 745331 IPsec server with NP offloading drops packets with an invalid SPI during rekey.
788751 IPsec VPN Interface shows incorrect TX/RX counter.
797342 Users cannot define an MTU value for the aggregate VPN.
798045 FortiGate is unable to install SA (failed to add SA, error 22) when there is an overlap in configured selectors.
810833 IPsec static router gateway IP is set to the gateway of the tunnel interface when it is not specified.
812229 A random four-character peer ID is displayed in the GUI and CLI when a VPN tunnel is formed using IKEv2 if the peer ID is not configured.
828933 iked signal 11 crash occurs once when running a VPN test script.
842571 If mode-cfg is used, a race condition can result in an IP conflict and sporadic routing problems in an ADVPN/SD-WAN network. Connectivity can only be restored by manually flushing the IPsec tunnels on affected spokes.
848014 ESP tunnel traffic hopping from VRF.
849515 ADVPN dynamic tunnel is picking a tunnel ID that is within another VPN interface IP range.
852868 Issues with synchronization of the route information (using add-route option) on spokes during HA failover that connect to dialup VPN.
855705 NAT detection in shortcut tunnel sometimes goes wrong.
855772 FortiGate IPsec tunnel role could be incorrect after rebooting or upgrading, and causes negotiation to be stuck when it comes up.
858681 When upgrading from 6.4.9 to 7.0.6 or 7.0.8, the traffic is not working between the spokes on the ADVPN environment.
858697 Native IPsec iOS authentication failure using LDAP account with two-factor authentication.
858715 IPsec phase 2 fails when both HA cluster members reboot at the same time.
861195 In IPsec VPN, the fnbamd process crashes when the password and one-time password are entered in the same Password field of the VPN client.
869166 IPsec tunnel does not coming up after the upgrading firmware on the branch FortiGate (FG-61E).
873097 Phase 2 not initiating the rekey at soft limit timeout on new kernel platforms.
876795 RADIUS server will reject new authentication if a previous session is missing ACCT-STOP to terminate the session, which causes the VPN connection to fail.
882483 ADVPN spoke does not delete the BGP route entry to another spoke over IPsec when the IPsec VPN tunnel is down.
885818 If a tunnel in an IPsec aggregate is down but its DPD link is on, the IPsec aggregate interface may still forward traffic to a down tunnel causing traffic to drop.
887800 In an L2TP configuration, set enforce-ipsec enable is not working as expected after upgrading.
891462 The Peer ID field in the IPsec widget should not show a warning message that Two-factor authentication is not enabled.
892699 In an HA cluster, static routes via the IPsec tunnel interface are not inactive in the routing table when the tunnel is down.
899822 IPsec dialup interface does not appear in the Interface dropdown when adding an Interface Bandwidth widget.

Log & Report

Bug ID Description
755632 Unable to view or download generated reports in the GUI if the report layout is custom.
795272 Local out DNS traffic is generating forward traffic logs with srcintf "unknown-0".
823183 FortiGates are showing Logs Queued in the GUI after a FortiAnalyzer reboot, even tough the queued logs were actually all uploaded to FortiAnalyzer and cleared when the connection restores.
825318 Archived Data tab is missing from intrusion prevention and application control log Details pane once log-packet is enabled.
828211 Policy ID filter is not working as expected.
829862 On the Log & Report > ZTNA Traffic page, the client’s Device ID is shown as [object Object]. The Log Details pane show the correct ID information.
836846 Packet captured by firewall policy cannot be downloaded.
838357 A deny policy with log traffic disabled is generating logs.
839601 When log pages are scrolled down, no logs are displayed after 500 lines of logs.
850519 Log & Report > Forward Traffic logs do not return matching results when filtered with !<application name>.
857573 Log filter with negation of destination IP display all logs.
858304 When FortiGate Cloud logging is enabled, the option to display 7 days of logs is not visible on the Dashboard > FortiView pages.
858589 Unable to download more than 500 logs from the FortiGate GUI.
860141 Syslog did not update the time after daylight saving time (DST) adjustment.
860264 The miglogd process may send empty logs to other logging devices.
860459 Unable to back up logs (FG-201E).
860487 Incorrect time and time zone appear in the forward traffic log when timezone is set to 18 (GMT-3 Brasilia).
861567 In A-P mode, when the link monitor fails, the event log displays a description of ha state is changed from 0 to 1.
864219 A miglogd crash occurs when creating a dynamic interface cache on an ADVPN environment.
872181 On the Log & Report > Log Settings > Local Logs page, the Local reports and Historical FortiView settings cannot be enabled.
872326 FortiGate cannot retrieve logs from FortiAnalyzer Cloud. Results are shown rarely.
873987 High memory usage from miglogd processes even without traffic.
879228 FortiAnalyzer override settings are not taking effect when ha-direct is enabled.
906888 Free-style filter not working as defined under config fortianalyzer override-filter.
918571 The log_se process resource utilization is causing a network outage.

Proxy

Bug ID Description
707827 The video filter does not display the proper replacement message when the user redirects to a blocked video from the YouTube homepage or video recommendation list.
746587 WAD crashes during traffic scan in proxy mode.
766158 Video filter FortiGuard category takes precedence over allowed channel ID exception in the same category.
781613 WAD crash occurs four times on FG-61F during stress testing.
796150 WAD crashed many times on FG-61F during stress testing.
818371 WAD process crashes with some URIs.
823078 WAD user-info process randomly consumes 100% CPU of one core.
825977 WAD crash occurs on FG-101F during stress testing.
834387 In a firewall proxy policy, the SD-WAN zone assigned to interface is not checked.
835745 WAD process is crashing after upgrading to FortiOS 7.2.1.
843318 If a client sends an HTTP request for a resource which is not yet cached by the FortiGate and the request header contains Cache-Control: only-if-cached, then the WAD worker process will crash with signal 11.
853864 FortiGate out-of-band certificate check issue occurs in a proxy mode policy with SSL inspection.
854511 Unable to make API calls using Postman Runtime script after upgrading to 7.2.0.
855853 WAD crashes frequently and utilizes high CPU.
855882 Increase in WAD process memory usage after upgrading.
856235 The WAD process memory usage gradually increases over a few days, causing the FortiGate to enter into conserve mode.
857368 An encoded HTTP header may be improperly handled, causing inadvertent disruption to traffic.
857507 When a server sends a connection close response too early, traffic from the client may be interrupted inadvertently before the request is completed.
858148 Memory leak in WAD user info history daemon.
870151 WAD memory leak occurs on TCP port and HTTP tunnel session port.
870554 WAD crash occurs with explicit proxy when IPv6 is enabled.
874563 User information attributes can cause disruption when they are not properly merged.
880712 WAD crashed with signal 11.
885674 Unable to send logs from FortiClient to FortiAnalyzer when deep inspection is enabled on firewall policy.
886284 Application WAD signal 11 crash occurs.

REST API

Bug ID Description
725048 Improve performance for /api/v2/monitor/system/available-interfaces (phase 2).
847526 Able to add incomplete policies with empty mandatory fields using the REST API.
849273 /api/v2/monitor/system/certificate/download can still download already deleted CSR files.
864393 High CPU usage of httpsd on FG-3600E HA system.
886012 Setting the MTU fails when a port is defined by the API.
892237 Updating the HA monitor interface using the REST API PUT request fails and returns a -37 error.

Routing

Bug ID Description
708904 No IGMP-IF for ifindex log points to multicast enabled interface.
724468 Router policy destination address not take effect when internet-service-id is configured.
821149 Early packet drop occurs when running UTM traffic on virtual switch interface.
827565 Using set load-balance-mode weight-based in SD-WAN implicit rule does not take effect occasionally.
893603 GUI does not show gateway IP on the routing table page if VDOM mode is transparent.
846107 IPv6 VRRP backup is sending RA, which causes routing issues.
848310 IPsec traffic sourced from a loopback interface does not follow the policy route or SD-WAN rules.
850778 Spoke-to-spoke communication randomly breaks. The BGP route to reach the spoke subnet points to the main ADVPN tunnel instead of the shortcut tunnel.
850862 When creating a new rule on the Network > Routing Objects page, the user cannot create a route map with a rule that has multiple similar or different AS paths in the GUI.
860075 Traffic session is processed by a different SD-WAN rule and randomly times out.
862165 FortiGate does not add the route in the routing table when it changes for SD-WAN members.
862418 Application VWL crash occurs after FortiManager configuration push causes an SD-WAN related outage.
862573 SD-WAN GUI does not load, and the lnkmtd process crashes frequently.
863318 Application forticron signal 11 (Segmentation fault) received.
865914 When BSM carries multiple CRPs, PIM might use the incorrect prefix to update the mroute’s RP information.
870983 Unable to set local-as in BGP confederation configuration.
883918 Delay in joining (S,G) in PIM-SM.
884372 All BGP routes in dual ADVPN redundant configuration are not getting updated to the correct WAN interface post-rollback to WAN failover.
890379 After upgrading, SD-WAN is unable to fail over the traffic when one interface is down.
897940 Link monitor’s probe timeout value range is not appropriate when the user decreases the minimum interval.

Security Fabric

Bug ID Description
753177 IoT device vulnerabilities should be included in security ratings.
809106 Security Fabric widget and Fabric Connectors page do not identify FortiGates properly in HA.
814796 The threat level threshold in the compromised host trigger does not work.
819192 After adding a Fabric device widget, the device widget does not appear in the dashboard.
825291 Security rating test for FortiAnalyzer fails when connected to FortiAnalyzer Cloud.
832015 Root FortiGate cannot finish the security rating with a large Fabric topology (more than 25 to 30 devices) because the REST API is not limited to the local network.
844412 When a custom LLDP profile has auto-isl disabled, the security rating test, Lockdown LLDP Profile, fails.
848822 The FortiAP Firmware Versions and FortiSwitch Firmware Versions security rating tests fail because the firmware version on the FortiAPs and FortiSwitches is not recognized correctly.
851656 Sessions with csf_syncd_log flag in a Security Fabric are not logged.
852340 Various places in the GUI do not show the secondary HA device.
862532 Unable to load topology pages for a specific Security Fabric topology on the root and downstream FortiGates.
867313 Error triggering automation stitch message appears when the license expiry notification type is FortiGuard Web Filter.
868701 In a simple cluster, the primary unit failed to upgrade to 7.2.3.
870527 FortiGate cannot display more than 500 VMs in a GCP dynamic address.
875100 Unable to remove external resource in a certain VDOM when the external resource has no reference in that VDOM.
880011 When the Security Fabric is enabled and admin-https-redirection is enabled on a downstream FortiGate, the following GUI features do not work for the downstream FortiGate when the administrator manages the downstream FortiGate using the root FortiGate’s GUI:

  • Web console access
  • Diagnostic packet capture
  • GUI notification when a new device joins or leaves the Security Fabric
  • GUI notification if a configuration on the current page changes

These features still work for the root FortiGate’s GUI.

885810 The gcpd daemon constantly crashes (signal 11 segmentation fault).
887967 Fabric crashes when synchronizing objects with names longer than 64 characters.
907172 Automation stitch with FortiDeceptor Fabric connector event trigger cannot be triggered.

SSL VPN

Bug ID Description
710657 The dstaddr/dstaddr6 of an SSL VPN policy can be set to all when split tunnel mode is enabled and only the default portal is set.
719740 The No SSL-VPN policies exist warning should not be shown in the GUI when a zone that has ssl.root as a member is set in an SSL VPN policy.
746440 When sending the SSL VPN settings email (VPN > SSL-VPN Settings > Send SSL-VPN Configuration), the Email template only includes a hyperlink to the configuration, which is not supported by Gmail and Fortinet email.
748085 Authentication request of SSL VPN realm can now only be sent to user group, local user, and remote group that is mapped to that realm in the SSL VPN settings. The authentication request will not be applied to the user group and remote group of non-realm or other realms.
787768 The web-mode setting should not be enabled when the portal is mapped in an SSL VPN policy where a VIP is applied.
808107 FortiGate is not sending Accounting-Request packet that contains the Interim-Update AVP when two-factor authentication is assigned to a user (defined on the FortiGate) while connecting using SSL VPN.
810239 Unable to view PDF files in SSL VPN web mode.
819754 Multiple DNS suffixes cannot be set for the SSL VPN portal.
828194 SSL VPN stops passing traffic after some time.
839261 On the VPN > SSL-VPN Settings page, when the source-address-negate option is enabled for an address in the CLI, the GUI does not display an exclamation mark against that address entry in the Hosts field.

This is cosmetic and does not affect on the FortiGate functionality or operation. The source-address-negate option being enabled can be confirmed in the CLI.

850898 OS checklist for the SSL VPN in FortiOS does not include macOS Ventura (13).
852566 User peer feature for one group to match to multiple user peers in the authentication rules is broken.
854143 Unable to access Synology NAS server through SSL VPN web mode.
854642 Internal website with JavaScript is proxying some functions in SSL VPN web mode, which breaks them.
856316 Browser displays an Error, Feature is not available message if a file larger than 1 MB is uploaded from FTP or SMB using a web bookmark, even though the file is uploaded successfully. There are no issues with downloading files.
856554 SSL VPN web mode top-right dropdown button (user profile menu) does not work.
859115 SSL VPN bookmark not accessible.
863860 RDP over SSL VPN web mode to a Windows Server changes the time zone to GMT.
864096 EcoStruxure Building Operations 2022 does not render using SSL VPN bookmark.
864417 In the second authentication of RADIUS two-factor authentication, the acct-update-interval returned is 0. SSL VPN uses the second return and not send RADIUS acct-interim-update packet.
867182 RDP/VNC host name is not encrypted when URL obscuration is enabled.
870061 Kernel does not delete original route after address assigned to the client changes.
873313 SSL VPN policy is ignored if no user or user group is set and the FSSO group is set.
873995 Problem with the internal website using SSL VPN web mode.
877896 When accessing the VDOM’s GUI in SSL VPN web mode, policies are only shown for a specific VDOM instead of all VDOMs.
884860 SSL VPN tunnel mode gets disconnected when SSL VPN web mode is disconnected by limit-user-logins.
890876 One of the speed-connect website JavaScript files has trouble with host process.

Switch Controller

Bug ID Description
730472 FortiSwitch enabled VLANs with VLAN and proxy ARP access have large latencies on initial ARP resolutions.
762615, 765283 FortiSwitches managed by FortiGate go offline intermittently and require a FortiGate reboot to recover.
769722 Support FortiLink to recognize a FortiSwitch based on its name and not just by serial number.
853718 Layer 3 FortiLink does not come up after upgrading.
854104 FortiLink daemon keeps pushing the configuration to FortiSwitch for a long time when the FortiSwitch is deleted and re-discovered.
857778 Switch controller managed switch port configuration changes do not take effect on the FortiSwitch.
858113 On the WiFi & Switch Controller > Managed FortiSwitches page, when an administrator with restricted access permissions is logged in, the Diagnostics and Tools page for a FortiSwitch cannot be accessed.
876021 FortiLink virtually managed switch port status is not getting pushed after the FortiGate reboots.
886887 When a MAC VLAN appears on the same MCLAG trunk, continuous event logs are received on FortiGate and FortiAnalyzer.

System

Bug ID Description
550701 WAD daemon signal 11 causes cmdbsvr deadlock.
649729 HA synchronization packets are hashed to a single queue when sync-packet-balance is enabled.
666664 Interface belonging to other VDOMs should be removed from interface list when configuring a GENEVE interface.
700621 The forticron daemon is constantly being restarted.
709679 Get can not set mac address(16) error message when setting a MAC address on an interface in HA that is already set.
713951 Not all ports are coming up after an LAG bounce on 8 × 10 GB LAG with ASR9K. Affected platforms: FG-3960E and FG-3980E.
722273 SA is freed while its timer is still pending, which leads to a kernel crash.
724085 Traffic passing through an EMAC VLAN interface when the parent interface is in another VDOM is blocked if NP7 offloading is enabled. If auto-asic-offload is disabled in the firewall policy, then the traffic flows as expected.
729912 DNS proxy does not transfer the DNS query for IPv6 neighbor discovery (ND) when client devices are using random MAC addresses, so one device can configure many IPv6 addresses.
748496 Wrong IP displayed in GUI widget if FortiGuard anycast AWS is used.
776646 On the Network > Interfaces page, configuring a delegated interface to obtain the IPv6 prefix from an upstream DHCPv6 server fails with an error notification (CLI internal error).
784169 When a virtual switch member port is set to be an alternate by STP, it should not reply with ARP; otherwise, the connected device will learn the MAC address from the alternate port and send subsequent packets to the alternate port.
790595 Improve dnsproxy process memory management.
799570 High memory usage occurs on FG-200F.
805122 In FIPS-CC mode, if cfg-save is set to revert, the system will halt a configuration change or certificate purge.
807629 NP7 dos-offload triggers an established TCP session to have synproxy process issues.
810137 Scheduled speed test crash is caused by adding the same object to a list twice.
810879 DoS policy ID cannot be moved in GUI and CLI when multiple DoS policies are enabled.
812957 When setting the speed of 1G SFP ports on FG-180xF platforms to 1000full, the interface does not come up after rebooting.
813607 LACP interfaces are flapping after upgrading.
815937 FCLF8522P2BTLFTN transceiver is not working after upgrade.
818897 The value of SNMP OID IP-MIB (RFC 4293) is inaccurate.
820268 VIP traffic access to the EMAC VLAN interface uses incorrect MAC address on NP7 platform.
826490 NP7 platforms may reboot unexpectedly when unable to handle kernel null pointer de-reference.
827240 FortiGate in HA may freeze and reboot. Before the reboot, softIRQ may be seen as high. This leads to a kernel panic.
828129 A disabled EMAC VLAN interface is replying to a ping.
836409 When deleting a non-existing entry, the error code returned is not appropriate.
838933 DoS anomaly has incorrect threshold after loading a modified configuration file.
840960 When kernel debug level is set to >=KERN_INFO on NP6xLite platforms, some tuples missing debug messages may get flooded and cause the system to get stuck.
845736 After rebooting the FortiGate, the MTU value on the VXLAN interface was changed.
847314 NP7 platforms may encounter random kernel crash after reboot or factory reset.
850683 Console keeps displaying bcm_nl.nr_request_drop ... after the FortiGate reboots because of the cfg-save revert setting under config system global. Affected platforms: FG-10xF and FG-20xF.
850688 FG-20xF system halts if setting cfg-save to revert under config system global and after the cfg-revert-timeout occurs.
852562 Huge configuration files cause delays during the booting process.
853144 Network device kernel null pointer is causing a kernel crash.
853794 Issue with the server_host_key_algorithm compatibility when using SSH on SolarWinds.
853811 Fortinet 10 GB transceiver LACP flapping when shut/no shut was performed on the interface from the switch side.
854388 Configuring set src-check disable is not persistent in the kernel after rebooting for GRE interfaces.
855573 False alarm of the PSU2 occurs with only one installed.
855775 Time zone for Kyiv, Ukraine is missing.
856202 Random reboots and kernel panic on NP7 cluster when the FortiGate sends a TCP RST packet and IP options are missing in the header.
859717 The FortiGate is only offering the ssh-ed25519 algorithm for an SSH connection.
859795 High CPU utilization occurs when relay is enabled on VLAN, and this prevents users from getting an IP from DHCP.
860052 The 40G/100G port goes down on FG-260xF when upgrading to 7.2.
860385 IPv6 BGP session drops when passing through a FortiGate configured with VRF.
862941 GUI displays a blank page if vdom-admin user has partial permissions.
867435 FG-400E-BP has crash at initXXXXXXXXXXX[1]: segfault at 3845d5a after package validation fails.
867978 Subnet overlap error occurs when configuring the same IPv4 link-local addresses on two different interfaces.
868225 After a cold reboot (such as a power outage), traffic interfaces may not come up with a possible loss of VLAN configurations.
868821 execute ssh-regen-keys should be global-level command.
869599 Forticron memory is leaking.
870381 Memory corruption or incorrect memory access when processing a bad WQE.
875868 HQIP test fails on FG-2201E.
876403 ACME auto-renewal is not performed after HA failover.
876853 No output of execute sensor list is displayed after rebooting.
876874 The Dashboard > Status > Sensor Information widget does not load.
877039 On the Network > BGP page, creating or editing a table entry increases memory consumption of the FortiGate to 99%.
877154 FortiGate with new kernel crashes when starting debug flow.
877240 Get zip conf file failed -1 error message when running a script configuring the FortiGate.
878400 When traffic is offloaded to an NP7 source MAC, the packets sent from the EMAC VLAN interface are not correct.
880290 NP7 is not configured properly when the ULL ports are added to LAG interface, which causes accounting on the LAG to not work.
881094 FG-3501F NP7 is dropping all traffic after it is offloaded.
882187 FortiGate enters conserve mode in a few hours after enabling UTM on the policies.
883071 Kernel panic occurs due to null pointer dereference.
887772 High CPU usage after upgrade to 7.2.4, WAD crashes continuously.
889634 Unable to configure IPv6 setting on system interface (FWF-81F-2R-POE).
891841 Unable to handle kernel NULL pointer dereference at 0000000000000000 for NP7 device; the device keeps rebooting.
899884 FG-3000F reboots unexpectedly with NULL pointer dereference.
909345 Kernel panic occurs when receiving ICMP redirect messages.

Upgrade

Bug ID Description
850691 The endpoint-control fctems entry 0 is added after upgrading from 6.4 to 7.0.8 when the FortiGate does not have EMS server, which means the endpoint-control fctems feature was not enabled previously. This leads to a FortiManager installation failure.
892647 Static route configurations were lost upgrading from 7.0.7 to 7.2.3.
900761 FG-601E crashes randomly after upgrading to 7.0.8 and 7.0.11.

User & Authentication

Bug ID Description
751763 When MAC-based authentication is enabled, multiple RADIUS authentication requests may be sent at the same time. This results in duplicate sessions for the same device.
823884 Searching in User & Authentication > User Definition shows results from other groups.
843528 RADIUS MAC authentication using ClearPass is intermittently using old credentials.
846545 LDAPS connectivity test fails with old WinAD after OpenSSL was upgraded to 3.0.2.
853793 FG-81F 802.1X MAC authentication bypass (MAB) failed to authenticate Cisco AP.
855898 All devices are detected as Other identified device in the Device Inventory widget.
856370 The EAP proxy worker application crashes frequently.
857438 SSL VPN group matching does not work as expected for Azure auto login.
858961 Client’s firewall authentication session timeout is set to 900 when it passes MAC authentication bypass by ping.
859845 In some cases, the proper hostnames are not showing up when looking at APs on the FortiSwitch ports screen.
864703 ACME client fails to work with some CA servers.
865166 A cid scan crash occurs when device detections happen in a certain order.
867225 ARP does not trigger FortiGuard device identification query.

VM

Bug ID Description
740796 IPv6 traffic triggers <interface>: hw csum failure message on CLI console.
856645 Session is not crated over NSX imported object when traffic starts to flow.
859165 Unable to enable FIPS cipher mode on FG-VM-ARM64-AWS.
859589 VPNs over Oracle Cloud stop processing traffic.
860096 CPU spike observed on all the cores in a GCP firewall VM.
868698 During a same zone AWS HA failover, moving the secondary IP will cause the EIP to be in a disassociated state.
869359 Azure auto-scale HA shows certificate error for secondary VM.
878074 FG-ARM64-GCP and FG-ARM64-AZURE have HA synchronization issue with internal IP after failover.
881728 Kernel hangs on FG-VM64-AZURE.
883203 FG-AWS SDN is unable to retrieve EKS cluster information, even thought its role is trusted by the EKS role.
883896 Backup virtual server not working as expected (ERR_EMPTY_RESPONSE).
885829 Azure SDN connector stopped processing when Azure returned NotFound error for VMSS interface from an AD DS-managed subscription.
890278 FG‑VM Rackspace On-Demand upgrade from 7.2.3 to 7.2.4 breaks the pay-as-you-go license, and reverts it to an evaluation license.
902816 Azure kernel panic occurs after a failover on the cluster.
912184 RIP: 0010:storvsc_queuecommand+0x57d/0x is observed after deploying an FG-VM64-AZURE in Standard_DS4_v2 size.

VoIP

Bug ID Description
757477 PRACK will cause voipd crashes when the following conditions are met: block-unknown is disabled in the SIP profile, the PRACK message contains SDP, and PRACK fails to find any related previous transactions (this is not a usual case).

Web Filter

Bug ID Description
766126 Block replacement page is not pushed automatically to replace the video content when using a video filter.
856793 In flow mode, URL filter configuration changes cause a spike in CPU usage of the IPS engine process.
863728 The urlfilter process causes a memory leak, even when the firewall policy is not using the web filter feature.
878442 FortiGuard block page image (logo) is missing when the Fortinet-Other ISDB is used.

WiFi Controller

Bug ID Description
807605 FortiOS exhibits segmentation fault on hostapd on the secondary controller configured in HA.
821320 FG-1800F drops wireless client traffic in L2 tunneled VLAN with capwap-offload enabled.
825182 The 6 GHz channel lists should be updated according to the latest WiFi country region channels map.
828901 Connectivity loss occurs due to switch and FortiAPs (hostapd crash).
831736 Application hostapd crash found on FG-101F.
834644 A hostapd process crash is shown in device crash logs.
835783 CAPWAP traffic is not offloaded when re-enabling capwap-offload.
837130 Wireless client shows portal related webpage while doing MAC authentication with MAB mode.
846730 Dynamic VLAN assignment is disabled in the GUI when editing an SSID with radius mac-auth and dynamic-vlan enabled.
856038 The voice-enterprise value changed after upgrading.
856830 HA FortiGate encounters multiple hostapd crashes.
857084 Hostapd segmentation fault signal 6 occurs upon HA failover.
857140 Hostapd segmentation fault signal 11 occurs upon RF chamber setup.
857975 The cw_acd process appears to be stuck, and is sending several access requests for MAC authentication.
858653 Invalid wireless MAC OUI detected for a valid client on the network.
861552 Wireless client gets disconnect from WiFi if it is connected to a WPA2 SSID more than 12 hours.
865260 Incorrect source IP used in the self-originating traffic to RADIUS server.
868022 Wi-Fi clients on a RADIUS MAC MPSK SSID get prematurely de-authenticated by the secondary FortiGate in the HA cluster.
882551 FortiWiFi fails to act as the root mesh AP, and leaf AP does not come online.
891625 Quarantined STA connected to a long interface name VAP is not moved to quarantined VLAN 4093.
892575 MPSK SSID with mpsk-schedules stopped working after the system time was changed due to daylight saving time.

ZTNA

Bug ID Description
832508 The EMS tag name (defined in the EMS server’s Zero Trust Tagging Rules) format changed in 7.2.1 from FCTEMS<serial_number>_<tag_name> to EMS<id>_ZTNA_<tag_name>.

After upgrading from 7.2.0 to 7.2.1, the EMS tag format was converted properly in the CLI configuration, but the WAD daemon is unable to recognize this new format, so the ZTNA traffic will not match any ZTNA policies with EMS tag name checking enabled.

859421 ZTNA server (access proxy VIP) is causing all interfaces that receive ARP request to reply with their MAC address.
863057 ZTNA real server address group gets unset once the FortiGate restarts.
865316 Adding an EMS tag on the Policy & Objects > Firewall Policy edit page for a normal firewall policy forces NAT to be enabled.
875589 WAD crash observed when a client EMS tag changes.
887307 WAD crashes after upgrading to 7.2 (build 1336 and later).

Common Vulnerabilities and Exposures

Bug ID CVE references
847867 FortiOS 7.2.5 is no longer vulnerable to the following CVE Reference:

  • CVE-2023-33305
862346 FortiOS 7.2.5 is no longer vulnerable to the following CVE Reference:

  • CVE-2022-43953
894631 FortiOS 7.2.5 is no longer vulnerable to the following CVE Reference:

  • CVE-2023-29178
898402 FortiOS 7.2.5 is no longer vulnerable to the following CVE Reference:

  • CVE-2023-27997
903303 FortiOS 7.2.5 is no longer vulnerable to the following CVE Reference:

  • CVE-2023-29180
909716 FortiOS 7.2.5 is no longer vulnerable to the following CVE Reference:

  • CVE-2023-29181
909722 FortiOS 7.2.5 is no longer vulnerable to the following CVE Reference:

  • CVE-2023-29179

Notatki producenta: FortiClient 7.2.5

Pozdrawiamy,

Zespół B&B
Bezpieczeństwo w biznesie

Post Views: 1 680

7.2.5 FortiGate FortiOS

Poprzedni artykułFortiOS 7.0.12Następny artykuł ESET PROTECT Cloud 4.4

Najnowsze

FortiAnalyzer 7.6.38 maja 2025
FortiManager 7.6.330 kwietnia 2025
FortiMail 7.6.322 kwietnia 2025

Kategorie

  • Acronis
  • Aktualności
  • Bez kategorii
  • ESET
  • F-Secure
  • FortiAnalyzer
  • FortiAP
  • FortiAuthenticator
  • FortiClient
  • FortiDeceptor
  • FORTIGATE
  • FORTIMAIL
  • FortiManager
  • FortiNAC
  • FortiSIEM
  • FORTISWITCH
  • FortiWeb
  • NAKIVO
  • Proget
  • Qnap
  • Stormshield
  • Szkolenia
  • Veeam
  • VMware
  • WithSecure

Tagi

6.0.6 6.2.2 6.2.7 6.4.0 6.4.4 6.4.5 6.4.8 7.0.0 7.0.2 7.0.5 7.2.0 7.2.2 ems Eset eset endpoint antivirus eset endpoint security ESET Inspect ESET Protect ESET Protect Cloud F-Secure FMG FortiAnalyzer forti analyzer FortiAP fortiap-w2 FortiAuthenticator FortiClient FortiClientEMS forticlient ems FortiGate FortiMail FortiManager FortiNAC Fortinet FortiOS FortiSIEM FortiSwitch FortiWeb vCenter vCenter Server VMware VMware ESXi vmware esxi 8.0 vmware vcenter VMware vCenter Server

MENU

  • Start
  • O nas
  • Produkty
  • Usługi
    • Szkolenia
    • Cyberbezpieczny Samorząd
    • Audyt bezpieczeństwa informacji
      • Testy penetracyjne
      • Testy ataków socjotechnicznych
    • Audyt konfiguracji Fortigate
    • Prezentacje
    • Wdrożenia
  • Blog techniczny
  • Pomoc
  • Kariera
  • Kontakt

BLOG TECHNICZNY

FortiAnalyzer 7.6.38 maja 2025
FortiManager 7.6.330 kwietnia 2025
FortiMail 7.6.322 kwietnia 2025

KONTAKT

biuro@b-and-b.plhttps://www.b-and-b.pl
8:00-16:00
RODO | POLITYKA PRYWATNOŚCI
OGÓLNE WARUNKI REKLAMACJI

BEZPIECZEŃSTWO W BIZNESIE 2025 - wszystkie prawa zastrzeżone

MENU

  • Start
  • O nas
  • Produkty
  • Usługi
    • Szkolenia
    • Cyberbezpieczny Samorząd
    • Audyt bezpieczeństwa informacji
      • Testy penetracyjne
      • Testy ataków socjotechnicznych
    • Audyt konfiguracji Fortigate
    • Prezentacje
    • Wdrożenia
  • Blog techniczny
  • Pomoc
  • Kariera
  • Kontakt

BLOG TECHNICZNY

FortiAnalyzer 7.6.38 maja 2025
FortiManager 7.6.330 kwietnia 2025
FortiMail 7.6.322 kwietnia 2025

Kontakt

+48 500-413-313
biuro@b-and-b.pl
8:00-16:00
Add new entry logo

Korzystamy z plików cookies lub podobnych technologii, by lepiej dopasować treści na stronie do Twoich potrzeb. W każdej chwili możesz zmienić ustawienia cookies. Polityka prywatności

Akceptuję Odmów
Cookies are small text files that can be used by websites to make a user's experience more efficient. The law states that we can store cookies on your device if they are strictly necessary for the operation of this site. For all other types of cookies we need your permission. This site uses different types of cookies. Some cookies are placed by third party services that appear on our pages.
  • Always Active
    Necessary
    Necessary cookies help make a website usable by enabling basic functions like page navigation and access to secure areas of the website. The website cannot function properly without these cookies.

  • Marketing
    Marketing cookies are used to track visitors across websites. The intention is to display ads that are relevant and engaging for the individual user and thereby more valuable for publishers and third party advertisers.

  • Analytics
    Analytics cookies help website owners to understand how visitors interact with websites by collecting and reporting information anonymously.

  • Preferences
    Preference cookies enable a website to remember information that changes the way the website behaves or looks, like your preferred language or the region that you are in.

  • Unclassified
    Unclassified cookies are cookies that we are in the process of classifying, together with the providers of individual cookies.