Resolved issues
The following issues have been fixed in FortiDeceptor 2.1.0. For inquires about a particular bug, please contact Customer Service & Support.
|
Bug ID |
Description |
|---|---|
| 0508165 | Allow client to create template from deception VM |
| 0526112 | Support Read-Only administrative rights in the admin profiles |
| 0559625 | Support an option for customers to reset the DCVM immediately once the incidents are detected |
| 0559675 | Implement the simulator server for IEC 60870-5-104 protocol |
| 0560549 | Export IOCs from FortiDeceptor in CSV format |
| 0568234 | Implement the firmware image auto upgrade |
| 0511926 | Create deception image upgrade module |
| 0562372 | Prepare and release SCADA base image |
| 0562383 | Prepare and release Windows 10 base image |
| 0560127 | Implement CLI command to purge all DATABASE records |
| 0569466 | Add links to Admin Guide and Release Notes to top bar |
| 0555665 | XSS vulnerability in Customized Widget Title of the Dashboard web page |
| 0555667 | XSS vulnerability in Profile Name of Admin Profile web page |
| 0555669 | XSS vulnerability in Common Name and Distinguished Name of LDAP Servers web page |
| 0555673 | XSS vulnerability in Email Account and Receiver List of Mails Servers web page |
| 0555674 | XSS vulnerability in field Name of Deploy Wizard web page |
|
0556970 |
Insecure Direct Object Reference vulnerability for the Super Admin |
|
0556971 |
Insecure Direct Object Reference vulnerability in the FortiDeceptor table customization |
|
0556973 |
Insecure Direct Object Reference privilege escalation to changing password of another account |
|
0565161 |
FortiDeceptor reports false alarm SMB incidents |
|
0558993 |
Deception VMs generate false events by generating traffic to the internet |
|
0558998 |
Incident and attack map records all connections on the network interface whether the traffic is destined for Deception VM or Not |
|
0566892 |
Without interaction, Windows Decoy receives traffic from external IP address and Decoy VM reported as Victim |
|
0557758 |
Unable to create VM's user account if the account already exists |
|
0566890 |
Trying to access the file share will result in to incidents with no info |
|
0567197 |
The incident was reported with reversed attacker IP + PORT and victim IP + PORT |
|
0567191 |
Default Attack map filter doesn’t reflect the recent incidents on the attack map |
|
0550367 |
Admin without administrative privileges can upgrade firmware through hidden page in the GUI |
|
0571831 |
Edit administrator failed unless reset password |
|
0566802 |
Rename Deception Technology terms in PPT/docs |
|
0559677 |
GUI relabeling |
|
0556008 |
Need to improve the GUI display for some basic information on incident table |
|
0523123 |
Change monitored deception IP needs redo conflict validation and initialization |
|
0545885 |
The input fields for Fabric settings should be sanitized properly before saving into a configuration file |