Fortinet white logo
Fortinet white logo

Resolved issues

Resolved issues

The following issues have been resolved in FortiADC 7.6.1 release. For inquiries about particular bugs, please contact Fortinet Customer Service & Support.

Bug ID

Description

1073584

dnsd needs to synchronize the FQDN real server IP from the Config Primary.

1083424 The SSL handshake error "unsafe legacy renegotiation disabled" occurs if the real server does not support the renegotiation extension.
1079989 Traffic logs cannot be displayed on the GUI due to improper deletion of outdated log data when the log file exceeds the 1.5 GB size limit.
1073974 Invalid DNS server responses, specifically 3 (NXDOMAIN) indicating "Non-Existent Domain" and 5 (REFUSED) indicating "Query Refused," are intercepted and suppressed, preventing these response codes from being forwarded back to the client.
1069133 False positives for SQL/XSS Injection Detection are triggered by legitimate requests containing Arabic language characters.
1067899 Unable to edit real servers from the FortiView Local Topology.
1066100 Unable to assign a /31 subnet IP to the interface for a point-to-point connection.
1063044 SAML authentication policy denied access for the secondary URI path.
1054660 When configuring a REST API Administrator, the API key cannot be generated if the setup is done through the Global configuration without access to the root VDOM.
1046923 Adaptive Learning does not support the same parameter or hidden field in different URLs under the same Virtual Server.
1046392 The current Adaptive Learning (AL) False Positive (FP) handling does not associate parameters with specific URLs. As a result, when multiple URLs share the same parameter across different policies, triggering FPs from distinct sources may produce two FP recommendations. However, only one policy can be updated upon acceptance, restricting FP adjustments to a single URL policy.
0934710 The authentication maximum timeout limit is capped at 6000 seconds, which may be insufficient for 2FA or SSO setups requiring extended session durations.
Common Vulnerabilities and Exposures

For more information, visit https://www.fortiguard.com/psirt.

Bug ID

Description

1055674 FortiADC 7.6.1 is no longer vulnerable to the following CVE-Reference: CVE-2024-3596.

0985993

FortiADC 7.6.1 is no longer vulnerable to the following CVE-Reference: CVE-2023-48795.

Resolved issues

Resolved issues

The following issues have been resolved in FortiADC 7.6.1 release. For inquiries about particular bugs, please contact Fortinet Customer Service & Support.

Bug ID

Description

1073584

dnsd needs to synchronize the FQDN real server IP from the Config Primary.

1083424 The SSL handshake error "unsafe legacy renegotiation disabled" occurs if the real server does not support the renegotiation extension.
1079989 Traffic logs cannot be displayed on the GUI due to improper deletion of outdated log data when the log file exceeds the 1.5 GB size limit.
1073974 Invalid DNS server responses, specifically 3 (NXDOMAIN) indicating "Non-Existent Domain" and 5 (REFUSED) indicating "Query Refused," are intercepted and suppressed, preventing these response codes from being forwarded back to the client.
1069133 False positives for SQL/XSS Injection Detection are triggered by legitimate requests containing Arabic language characters.
1067899 Unable to edit real servers from the FortiView Local Topology.
1066100 Unable to assign a /31 subnet IP to the interface for a point-to-point connection.
1063044 SAML authentication policy denied access for the secondary URI path.
1054660 When configuring a REST API Administrator, the API key cannot be generated if the setup is done through the Global configuration without access to the root VDOM.
1046923 Adaptive Learning does not support the same parameter or hidden field in different URLs under the same Virtual Server.
1046392 The current Adaptive Learning (AL) False Positive (FP) handling does not associate parameters with specific URLs. As a result, when multiple URLs share the same parameter across different policies, triggering FPs from distinct sources may produce two FP recommendations. However, only one policy can be updated upon acceptance, restricting FP adjustments to a single URL policy.
0934710 The authentication maximum timeout limit is capped at 6000 seconds, which may be insufficient for 2FA or SSO setups requiring extended session durations.
Common Vulnerabilities and Exposures

For more information, visit https://www.fortiguard.com/psirt.

Bug ID

Description

1055674 FortiADC 7.6.1 is no longer vulnerable to the following CVE-Reference: CVE-2024-3596.

0985993

FortiADC 7.6.1 is no longer vulnerable to the following CVE-Reference: CVE-2023-48795.