B&B Bezpieczeństwo w biznesie
  • Start
  • O nas
  • Produkty
  • Usługi
    • Szkolenia
    • Cyberbezpieczny Samorząd
    • Audyt bezpieczeństwa informacji
      • Testy penetracyjne
      • Testy ataków socjotechnicznych
    • Audyt konfiguracji Fortigate
    • Prezentacje
    • Wdrożenia
  • Blog techniczny
  • Pomoc
  • Kariera
  • Kontakt

FortiOS 5.4.10 

Nowa wersja oprogramowania FortiOS oznaczona numerem 5.4.1 została wydana. W najnowszej odsłonie z linii 5.4.x zostało wprowadzone kilka poprawek oraz załatano kilka błędów. Zachęcamy do aktualizacji Firmware na swoich urządzeniach.

Urządzenia które wspiera wersja FortiOS 5.4.10 to:

FortiGate

FG-30D, FG-30E, FG-30D-POE, FG-50E, FG-51E, FG-60D, FG-60D-POE, FG-70D,
FG-70D-POE, FG-80C, FG-80CM, FG-80D, FG-90D, FG-90D-POE, FG-92D, FG94D-POE,
FG-98D-POE, FG-100D, FG-140D, FG-140D-POE, FG- 200D, FG-200DPOE,
FG-240D, FG-240D-POE, FG-280D-POE, FG-300D, FG-400D, FG-500D, FG600C,
FG-600D, FG-800C, FG-800D, FG-900D, FG-1000C, FG-1000D, FG-1200D,
FG-1500D, FG-1500DT, FG-3000D, FG-3100D, FG-3200D, FG-3240C, FG-3600C,
FG-3700D, FG-3700DX, FG-3800D, FG-3810D, FG-3815D, FG-5001C, FG-5001D

FortiWiFi

FWF-30D, FWF-30E, FWF-30D-POE, FWF-50E, FWF-51E, FWF-60D,
FWF-60D-POE, FWF-80CM, FWF-81CM, FWF-90D, FWF-90D-POE

FortiGate Rugged

FGR-60D, FGR-90D

FortiGate VM

FG-SVM, FG-VM64, FG-VM64-AWS, FG-VM64-AWSONDEMAND,
FG-VM64-AZURE, FG-VM64-AZUREONDEMAND, FG-VM64-HV, FG-VM64-KVM,
FG-VM64-OPC, FG-VMX, FG-VM64-XEN

Rozwiązane problemy:

AntiVirus
Bug ID Description

446793 Too many files pending in forticloud-fsb even though quard used memory is normal.
461707 FortiGate cannot generate replacement messages properly when FortiGate set block
oversize for SMTP.

Firewall
Bug ID Description

371526 realserver persistence with shaping-policy does not work well.
466602 U-turn traffic in Transparent mode VDOM does not check the incoming firewall policy.

FortiView
Bug ID Description

433630 FortiView All Sessions shows no data if PC and FortiGate timezones are different.

GUI
Bug ID Description

450919 IPS sensor with >= 8192 signature entries should not be created from GUI.
462011 GUI is blank when access with RADIUS user with read-access profile and the FortiGate is managed by FortiManager.
485386 Adding a signature on existing IPS sensor profile gives internal server error -500 error message on web GUI.
486346 Ambulance context icon present in FortiGuard web filter categories instead of a checkmark.

HA
Bug ID Description

446804 Diagnose firewall auth list flushed in 5 min after a failover.
462021 Update daemon run in HA_slave unit after upgrade.
465849 Wrong diagnose sys ha dump-by vcluster display when cluster is on the same LAN.

IPS
Bug ID Description

445134 The behavior of config anomaly in firewall DOS-policy changed during rebooting.
451452 IPS engine signal 14 alarm clock crash on FG-90D.
465134 SYN proxy still active when syn rate goes below configured threshold or is disabled.

IPsec VPN
Bug ID Description

390353 ICMP fragmentation needed is returned even when original packet size is less than destination LAN interface MTU.

Log & Report
Bug ID Description

477592 Data shown under incorrect date in Logs Sent to FortiAnalyzer Daily graph.

Proxy
Bug ID Description

409604 WAD crashing when get invalid firewall address.
452267 Web radio web sites cannot be opened with AV in proxy mode and inspect all enabled in the protocol options profile.
454185 Specific application does not work when deep inspection is enabled.
455779 User source IP in ICAP data packets.
467709 High memory usage on WAD process with low session count.

Router
Bug ID Description

472512 FortiGate not forwarding DNS packets when policy route is hit and DNS filter profile is applied to firewall policy.
480978 OSPF summary-address synchronized with FGSP.

SSL VPN
Bug ID Description

466438 High CPU usage by sslvpnd (web and mixed mode).
466821 Accessing Cisco Unified Communications Manager not working properly.
473963 Web-portal allows access only to resources based on the first matched policy and its group.
483712 sslvpnd consumes high memory causing FortiGate to enter conserve mode.

System
Bug ID Description

370953 SLBC worker blade failed to re-synchronize with the config master blade due to the frozen confsync daemon.
415910 CPU cores utilization shows 0 percent while handling CPS in 5.4.
436399 snmpd crashes with signal 11 in get_fgHaStatsEntry.
449160 CPU0 and CPU1’s IRQ got busy after traffic stopped.
457004 DHCP relay sends too many DHCP offers to client.
459273 Slave worker blade loses local administrator accounts.
477135 Updates of FortiGuard are causing CPU spikes which slows down regular traffic.
478307 SNMP reports incorrect MTU on GRE tunnels.
479142 SLBC 5001D slave blade going out of sync.
483014,488587 FortiGate is rebooting at least once a day due to kernel panic.
488611 virtual-wire-pair IPv6 reflection session – ghost IPv6 sessions stacking in kernel/NP.
493052 Sometimes 5001D slave blade loses kernel static route after down/up traffic interface in
5001D/5913C SLBC system.

Upgrade
Bug ID Description

495994 After upgrade to 5.4.9, observing lot of IPS syntax errors on the console screen.

VM
Bug ID Description

408366 FGT_VM64 fails to join HA cluster after upgrade to b1117 (from b1111).

WebAppFirewall
Bug ID Description

463468 Clients are unable to connect to mail server when WAF is enabled on the VIP policy.
477074 Inconsistent WAF behavior.

WiFi
Bug ID Description

484556 URL filter does not match for right-hand matched URL when there is similar URL entry which includes – (dash).
485685 Proceeding from a web filter warning page intermittently results in the BLOCK page shown instead of the expected web site.
486466 HTTPS web page is blocked after clicking Proceed button.
491381 FOS 5.4 needs to configure DFS channels for FAP-221E/223E in Japan.

Common Vulnerabilities and Exposures
Visit https://fortiguard.com/psirt for more information.

Bug ID CVE references

496431 FortiOS 5.4.10 is no longer vulnerable to the following CVE Reference:
l CVE-2018-9192

497128 FortiOS 5.4.10 is no longer vulnerable to the following CVE Reference:
l CVE-2018-9194

Znane problemy do rozwiązania:

AntiVirus
Bug ID Description

374969 FortiSandbox FortiView may not correctly parse the FSA v2.21 tracer file(.json).

Endpoint Control
Bug ID Description

374855 Third party compliance may not be reported if FortiClient has no AV feature.
375149 FortiGate does not auto update AV signature version while Endpoint Control (fortiheartbeat) is enabled but no AV profile is used.

Firewall
Bug ID Description

364589 LB VIP slow access when cookie persistence is enabled.

FortiGate-3815D
Bug ID Description

385860 FortiGate-3815D does not support 1 GE SFP transceivers.

FortiRugged-60D
Bug ID Description

375246 invalid hbdev dmz may be received if the default hbdev is used.

FortiSwitch-Controller/FortiLink
Bug ID Description

304199 Using HA with FortiLink can encounter traffic loss during failover.
357360 DHCP snooping may not work on IPv6.
369099 FortiSwitch authorizes successfully but fails to pass traffic until you reboot FortiSwitch.

FortiView
Bug ID Description

368644 Physical Topology: Physical Connection of stacked FortiSwitch may be incorrect.
372350 Threat view: Threat Type and Event information is missing in the last level of the threat view.
375187 Using realtime auto update may increase chrome browser memory usage.

GUI
Bug ID Description

289297 Threat map may not be fully displayed when screen resolution is not big enough.
297832 Administrator with read-write permission for Firewall Configuration is not able to read or write firewall policies.
355388 The Select window for remote server in remote user group may not work as expected.
365223 In Security Fabric topology, a downstream FortiGate may be shown twice when it uses hardware switch to connect upstream.
365317 Unable to add new AD group in second FSSO local polling agent.
365378 You may not be able to assign ha-mgmt-interface IP address in the same subnet as another port from the GUI.
368069 Cannot select wan-load-balance or members for incoming interface of IPsec tunnel.
369155 There is no Archived Data tab for email attachment in the DLP log detail page.
372908 The interface tooltip keeps loading the VLAN interface when its physical interface is in another VDOM.
373363 Multicast policy interface may list the wan-load-balance interface.
373546 Only 50 security logs may be displayed in the Log Details pane when more than 50 are triggered.
374081 wan-load-balance interface may be shown in the address associated interface list.
374162 GUI may show the modem status as Active in the Monitor page after setting the modem to disable.
374224 The Ominiselect widget and Tooltip keep loading when clicking a newly created object in the Firewall Policy page.
374320 Editing a user from the Policy list page may redirect to an empty user edit page.
374322 Interfaces page may display the wrong MAC Address for the hardware switch.
374363 Selecting Connect to CLI from managed FAP context menu may not connect to FortiAP.
374373 Policy View: Filter bar may display the IPv4 policy name for the IPv6 policy.
374397 Should only list any as destination interface when creating an explicit proxy in the TP VDOM.
374521 Unable to Revert revisions in GUI.
374525 When activating the FortiCloud/Register-FortiGate, clicking OK may not work the first time.
375036 The Archived Data in the Sniffer Traffic log may not display detailed content and download.
375227 You may be able to open the dropdown box and add new profiles even though errors occur when editing a Firewall Policy page.
375259 Addrgrp editing page receives a js error if addrgrp contains another group object.
375346 You may not be able to download the application control packet capture from the forward traffic log.
375369 May not be able to change IPsec manualkey config in GUI.
375383 The Policy list page may receive a js error when clicking the search box if the policy includes wan-load-balance interface.
379050 User Definition intermittently not showing assigned token.

HA
Bug ID Description

403097 Some IPsec SAs not synced to HA slave.
479311 Certificate status changes from OK to Pending one minute after importing certificate from GUI on vcluster device.

IPsec
Bug ID Description

393958 Shellshock attack succeeds when FGT is configured with server-cert-mode replace and an attacker uses rsa_3des_sha.
435124 Cannot establish IPsec phase1 tunnel after upgrading from version 5.4.5 to 5.6.0.
Workaround: After upgrading to 5.6.0, reconfigure all IPsec phase1 psksecret settings.
439923 IKE static tunnels using set peertype one may fail to negotiate.

Router
Bug ID Description

299490 During and after failover, some multicast groups take up to 480 seconds to recover.

SSL VPN
Bug ID Description

303661 The Start Tunnel feature may have been removed.
304528 SSL VPN Web Mode PKI user might immediately log back in even after logging out.
374644 SSL VPN tunnel mode Fortinet bar may not be displayed.
382223 SMB/CIFS bookmark in SSL VPN portal doesn’t work with DFS Microsoft file server error “Invalid HTTP request”.

System
Bug ID Description

287612 Span function of software switch may not work on FortiGate-51E/FortiGate-30E.
290708 nturbo may not support CAPWAP traffic.
295292 If private-data-encryption is enabled, when restoring config to a FortiGate, the FortiGate may not prompt the user to enter the key.
304199 FortiLink traffic is lost in HA mode.
371320 show system interface may not show the Port list in sequential order.
372717 Option admin-https-banned-cipher in sys global may not work as expected.
392960 FOS support for V4 BIOS.
416452 Admin profiles with addresses read-write permission will not work for reputation/VIP/address page.
445383 Traffic cannot go through LACP static mode interface with NP6 offload enabled.

Upgrade
Bug ID Description

289491 When upgrading from 5.2.x to 5.4.0, port-pair configuration may be lost if the port-pair name exceeds 12 characters.

Visibility
Bug ID Description

374138 FortiGate device with VIP configured may be put under Router/NAT devices because of an
address change.

Więcej informacji tutaj: Release notes 5.4.10 Build 1220

 
Pozdrawiamy,

Zespół B&B
Bezpieczeństwo w biznesie

Post Views: 2 063

FortiGate FortiOS

Poprzedni artykułESET Endpoint Security, ESET Endpoint Antivirus 7Następny artykuł FortiWeb 6.0.1

Najnowsze

FortiAnalyzer 7.6.38 maja 2025
FortiManager 7.6.330 kwietnia 2025
FortiMail 7.6.322 kwietnia 2025

Kategorie

  • Acronis
  • Aktualności
  • Bez kategorii
  • ESET
  • F-Secure
  • FortiAnalyzer
  • FortiAP
  • FortiAuthenticator
  • FortiClient
  • FortiDeceptor
  • FORTIGATE
  • FORTIMAIL
  • FortiManager
  • FortiNAC
  • FortiSIEM
  • FORTISWITCH
  • FortiWeb
  • NAKIVO
  • Proget
  • Qnap
  • Stormshield
  • Szkolenia
  • Veeam
  • VMware
  • WithSecure

Tagi

6.0.6 6.2.2 6.2.7 6.4.0 6.4.4 6.4.5 6.4.8 7.0.0 7.0.2 7.0.5 7.2.0 7.2.2 ems Eset eset endpoint antivirus eset endpoint security ESET Inspect ESET Protect ESET Protect Cloud F-Secure FMG FortiAnalyzer forti analyzer FortiAP fortiap-w2 FortiAuthenticator FortiClient FortiClientEMS forticlient ems FortiGate FortiMail FortiManager FortiNAC Fortinet FortiOS FortiSIEM FortiSwitch FortiWeb vCenter vCenter Server VMware VMware ESXi vmware esxi 8.0 vmware vcenter VMware vCenter Server

MENU

  • Start
  • O nas
  • Produkty
  • Usługi
    • Szkolenia
    • Cyberbezpieczny Samorząd
    • Audyt bezpieczeństwa informacji
      • Testy penetracyjne
      • Testy ataków socjotechnicznych
    • Audyt konfiguracji Fortigate
    • Prezentacje
    • Wdrożenia
  • Blog techniczny
  • Pomoc
  • Kariera
  • Kontakt

BLOG TECHNICZNY

FortiAnalyzer 7.6.38 maja 2025
FortiManager 7.6.330 kwietnia 2025
FortiMail 7.6.322 kwietnia 2025

KONTAKT

biuro@b-and-b.plhttps://www.b-and-b.pl
8:00-16:00
RODO | POLITYKA PRYWATNOŚCI
OGÓLNE WARUNKI REKLAMACJI

BEZPIECZEŃSTWO W BIZNESIE 2025 - wszystkie prawa zastrzeżone

MENU

  • Start
  • O nas
  • Produkty
  • Usługi
    • Szkolenia
    • Cyberbezpieczny Samorząd
    • Audyt bezpieczeństwa informacji
      • Testy penetracyjne
      • Testy ataków socjotechnicznych
    • Audyt konfiguracji Fortigate
    • Prezentacje
    • Wdrożenia
  • Blog techniczny
  • Pomoc
  • Kariera
  • Kontakt

BLOG TECHNICZNY

FortiAnalyzer 7.6.38 maja 2025
FortiManager 7.6.330 kwietnia 2025
FortiMail 7.6.322 kwietnia 2025

Kontakt

+48 500-413-313
biuro@b-and-b.pl
8:00-16:00
Add new entry logo

Korzystamy z plików cookies lub podobnych technologii, by lepiej dopasować treści na stronie do Twoich potrzeb. W każdej chwili możesz zmienić ustawienia cookies. Polityka prywatności

Akceptuję Odmów
Cookies are small text files that can be used by websites to make a user's experience more efficient. The law states that we can store cookies on your device if they are strictly necessary for the operation of this site. For all other types of cookies we need your permission. This site uses different types of cookies. Some cookies are placed by third party services that appear on our pages.
  • Always Active
    Necessary
    Necessary cookies help make a website usable by enabling basic functions like page navigation and access to secure areas of the website. The website cannot function properly without these cookies.

  • Marketing
    Marketing cookies are used to track visitors across websites. The intention is to display ads that are relevant and engaging for the individual user and thereby more valuable for publishers and third party advertisers.

  • Analytics
    Analytics cookies help website owners to understand how visitors interact with websites by collecting and reporting information anonymously.

  • Preferences
    Preference cookies enable a website to remember information that changes the way the website behaves or looks, like your preferred language or the region that you are in.

  • Unclassified
    Unclassified cookies are cookies that we are in the process of classifying, together with the providers of individual cookies.