Fortinet black logo

Resolved issues

Resolved issues

The following issues have been resolved in FortiADC 6.1.6 release. For inquiries about particular bugs, please contact Fortinet Customer Service & Support.

Bug ID

Description

0783856

CAPTCHA page does not allow Enter key to submit.

0781593

Maintenance page displays undefined elements when login as restricted admin.

0782260 Management interface shows as down.

0781338

Column configuration button does not work on Log & Report pages.

0780949 Subcategory column displays the category name with underscores on WAF Aggregate Log page.
0780890 Filter "Subcat" does not accept the value displayed on Security Log page.
0779762

When filtering, if a filter is selected before clicking the Add Filter button, the selected filter would appear in the drop-down but would not be selectable as a filter option.

0775262 FortiADC Radius SLB with Dynamic Authorization is not functioning correct and NAT is not applied.
0774824 Action mismatch between WAF alert and Logs.
0774607 CPU spikes occurring in both of the paired FortiADC units due to the DNSPod multi-thread daemon accessing null schedule data when the DNS request is very high.
0774178

Application profile does not accept domain names that include numbers.

0773648

Non-root interfaces are not shown in the GUI HA Remote IP Monitor List, but is shown in the CLI.

0772424

Duplicated listen port error when changing HA mgmt IP.

0772149 FortiADC firewall function failure when the address group name is too long.
0770832 Debug producing junk output.
0770608 Unable to register in FortiCare from AWS with FortiADC PAYG instance.
0770037 URL that contain "on" in the string (such as "on1" or "one23") is detected as SQL/XSS injection attack.

0769906

The get system status CLI returns the incorrect expiry date even when GUI displays correct information.

0769573 Telnet and SNMP are enabled by default on port1.

0766854

Cookie-Security WAF function causes VS-persistence to fail.

0766441

Unable to configure WAF exception rules through GUI.

0765668 Kernel HA module crash.

0761550

FortiADC may reboot multiple times during upgrade when not using HA sync upgrade in HA environment.

0756750

Health check via GUI is not working properly for VDOM.

0755518

The system restore for local certificate failed.

0755205

HA VRRP Unicast mode switch prompt shows incorrectly.

0754366

Abnormal memory usage after upgrade from version 5.4.4 to 6.0.3.

0754313

Parameter Validation does not work.

0753788

There is no length restriction for NAT Pool name in GUI.

0753583

Error "Your changes saved failed".

0747637

FortiADCs in HA crashed one after the other.

0747293

Client browser stuck in loop after authentication session timeout.

0741343

Disable LLDP on Intel XL710 to solve the flapping issue.

0716276

FortiADC device cluster randomly reboots causing service outage.

Common Vulnerabilities and Exposures

For more information, visit https://www.fortiguard.com/psirt.

Bug ID

Description

0761194 FortiADC 6.1.6 is no longer vulnerable to the following CVE-Reference: CWE-269: Improper Privilege Management

Resolved issues

The following issues have been resolved in FortiADC 6.1.6 release. For inquiries about particular bugs, please contact Fortinet Customer Service & Support.

Bug ID

Description

0783856

CAPTCHA page does not allow Enter key to submit.

0781593

Maintenance page displays undefined elements when login as restricted admin.

0782260 Management interface shows as down.

0781338

Column configuration button does not work on Log & Report pages.

0780949 Subcategory column displays the category name with underscores on WAF Aggregate Log page.
0780890 Filter "Subcat" does not accept the value displayed on Security Log page.
0779762

When filtering, if a filter is selected before clicking the Add Filter button, the selected filter would appear in the drop-down but would not be selectable as a filter option.

0775262 FortiADC Radius SLB with Dynamic Authorization is not functioning correct and NAT is not applied.
0774824 Action mismatch between WAF alert and Logs.
0774607 CPU spikes occurring in both of the paired FortiADC units due to the DNSPod multi-thread daemon accessing null schedule data when the DNS request is very high.
0774178

Application profile does not accept domain names that include numbers.

0773648

Non-root interfaces are not shown in the GUI HA Remote IP Monitor List, but is shown in the CLI.

0772424

Duplicated listen port error when changing HA mgmt IP.

0772149 FortiADC firewall function failure when the address group name is too long.
0770832 Debug producing junk output.
0770608 Unable to register in FortiCare from AWS with FortiADC PAYG instance.
0770037 URL that contain "on" in the string (such as "on1" or "one23") is detected as SQL/XSS injection attack.

0769906

The get system status CLI returns the incorrect expiry date even when GUI displays correct information.

0769573 Telnet and SNMP are enabled by default on port1.

0766854

Cookie-Security WAF function causes VS-persistence to fail.

0766441

Unable to configure WAF exception rules through GUI.

0765668 Kernel HA module crash.

0761550

FortiADC may reboot multiple times during upgrade when not using HA sync upgrade in HA environment.

0756750

Health check via GUI is not working properly for VDOM.

0755518

The system restore for local certificate failed.

0755205

HA VRRP Unicast mode switch prompt shows incorrectly.

0754366

Abnormal memory usage after upgrade from version 5.4.4 to 6.0.3.

0754313

Parameter Validation does not work.

0753788

There is no length restriction for NAT Pool name in GUI.

0753583

Error "Your changes saved failed".

0747637

FortiADCs in HA crashed one after the other.

0747293

Client browser stuck in loop after authentication session timeout.

0741343

Disable LLDP on Intel XL710 to solve the flapping issue.

0716276

FortiADC device cluster randomly reboots causing service outage.

Common Vulnerabilities and Exposures

For more information, visit https://www.fortiguard.com/psirt.

Bug ID

Description

0761194 FortiADC 6.1.6 is no longer vulnerable to the following CVE-Reference: CWE-269: Improper Privilege Management