Fortinet black logo

Resolved issues

Resolved issues

The following issues have been fixed in FortiProxy 2.0.12. For inquiries about a particular bug, please contact Customer Service & Support.

Bug ID

Description

800873

Fix webfilter quota bytes miscalculation and wrong bytes usage in ftgd quota log.

818869

FTP traffic does not get redirected to WAD.

819887

GCP does not process multipart MIME data.

846870

Allow management access to local interfaces with IPsec and SSLVPN.

847484

Read-only administrators able to sniff other administrators' cookies.

850727

Authentication for SSH fails.

850841

Arbitrary read/write vulnerability in custom language.

852416

Trusted host IP table rules are only generated for super administrators.

854176

Patch for arbitrary file deletion in log reports.

854229

Path traversal vulnerability allowed VDOM escaping.

859001

859041

869099

High memory usage.

775118

Change encryption method of backup files to AES-GCM.

883775

100% Disk usage for the "/data" partition.

889311

SSLVPNd keeps restarting.

Common vulnerabilities and exposures

FortiProxy 2.0.12 is no longer vulnerable to the following CVE references. Visit https://fortiguard.com/psirt for more information.

Bug ID

CVE reference

854181

CVE-2022-42475

866003

CVE-2022-45861

854176

CVE-2022-42474

Resolved issues

The following issues have been fixed in FortiProxy 2.0.12. For inquiries about a particular bug, please contact Customer Service & Support.

Bug ID

Description

800873

Fix webfilter quota bytes miscalculation and wrong bytes usage in ftgd quota log.

818869

FTP traffic does not get redirected to WAD.

819887

GCP does not process multipart MIME data.

846870

Allow management access to local interfaces with IPsec and SSLVPN.

847484

Read-only administrators able to sniff other administrators' cookies.

850727

Authentication for SSH fails.

850841

Arbitrary read/write vulnerability in custom language.

852416

Trusted host IP table rules are only generated for super administrators.

854176

Patch for arbitrary file deletion in log reports.

854229

Path traversal vulnerability allowed VDOM escaping.

859001

859041

869099

High memory usage.

775118

Change encryption method of backup files to AES-GCM.

883775

100% Disk usage for the "/data" partition.

889311

SSLVPNd keeps restarting.

Common vulnerabilities and exposures

FortiProxy 2.0.12 is no longer vulnerable to the following CVE references. Visit https://fortiguard.com/psirt for more information.

Bug ID

CVE reference

854181

CVE-2022-42475

866003

CVE-2022-45861

854176

CVE-2022-42474