Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:


Table of Contents

Resolved issues

The following issues have been resolved in FortiADC 7.0.1 release. For inquiries about particular bugs, please contact Fortinet Customer Service & Support.

Bug ID

Description

0790383 GUI typo in Security Fabric > Automation: Configuraton → Configuration
0789647 L2 exception list is limited to 300 entries.
0788758 SSL Forward Proxy memory leak.
0783856 CAPTCHA page does not allow Enter key to submit.
0782707/0781234/0775097 Httproxy-ssl and httproxy crash related to WAF issues.
0782260 Management interface shows as down.
0782132 Website associated with a VS stops responding intermittently.
0777422 DNS resolving fails for SDN connectors.
0777069 TFTP Health Check script does not work.
0776674 SFP information does not display with diagnose hardware get deviceinfo transceiver CLI command on some hardware models, such as 2200F and 4200F.
0775509 Pop-up window displaying management IP showing in GUI, FortiView > OWASP Top 10 > A1:2017-Injection.
0775262 FortiADC Radius SLB with Dynamic Authorization is not functioning correct and NAT is not applied.
0774824 Action mismatch between WAF alert and Logs.
0774818 GUI typo: Patten → Pattern, Contrain → Constraint
0774178 Application profile does not accept domain names that include numbers.
0773368 High memory and crash due to restapi, httproxy-ssl and infod.
0772149 FortiADC firewall function failure when the address group name is too long.
0770037 URL that contain "on" in the string (such as "on1" or "one23") is detected as SQL/XSS injection attack.

0766519

NULL pointer dereference in GREP utility.

0766502 Ntpdate crash issue.
0765668 Kernel HA module crash.

0762053

Should implement OFTP support for logging to FortiAnalyzer.

0741343

Disable LLDP on Intel XL710 to solve the flapping issue.

Common Vulnerabilities and Exposures

For more information, visit https://www.fortiguard.com/psirt.

Bug ID Description
0765175 FortiADC 7.0.1 is no longer vulnerable to the following CVE-Reference: CWE-134: Use of Externally-Controlled Format String.

Resolved issues

The following issues have been resolved in FortiADC 7.0.1 release. For inquiries about particular bugs, please contact Fortinet Customer Service & Support.

Bug ID

Description

0790383 GUI typo in Security Fabric > Automation: Configuraton → Configuration
0789647 L2 exception list is limited to 300 entries.
0788758 SSL Forward Proxy memory leak.
0783856 CAPTCHA page does not allow Enter key to submit.
0782707/0781234/0775097 Httproxy-ssl and httproxy crash related to WAF issues.
0782260 Management interface shows as down.
0782132 Website associated with a VS stops responding intermittently.
0777422 DNS resolving fails for SDN connectors.
0777069 TFTP Health Check script does not work.
0776674 SFP information does not display with diagnose hardware get deviceinfo transceiver CLI command on some hardware models, such as 2200F and 4200F.
0775509 Pop-up window displaying management IP showing in GUI, FortiView > OWASP Top 10 > A1:2017-Injection.
0775262 FortiADC Radius SLB with Dynamic Authorization is not functioning correct and NAT is not applied.
0774824 Action mismatch between WAF alert and Logs.
0774818 GUI typo: Patten → Pattern, Contrain → Constraint
0774178 Application profile does not accept domain names that include numbers.
0773368 High memory and crash due to restapi, httproxy-ssl and infod.
0772149 FortiADC firewall function failure when the address group name is too long.
0770037 URL that contain "on" in the string (such as "on1" or "one23") is detected as SQL/XSS injection attack.

0766519

NULL pointer dereference in GREP utility.

0766502 Ntpdate crash issue.
0765668 Kernel HA module crash.

0762053

Should implement OFTP support for logging to FortiAnalyzer.

0741343

Disable LLDP on Intel XL710 to solve the flapping issue.

Common Vulnerabilities and Exposures

For more information, visit https://www.fortiguard.com/psirt.

Bug ID Description
0765175 FortiADC 7.0.1 is no longer vulnerable to the following CVE-Reference: CWE-134: Use of Externally-Controlled Format String.