Fortinet white logo
Fortinet white logo

Resolved issues

Resolved issues

The following issues have been fixed in FortiProxy 7.4.6. For inquiries about a particular bug, please contact Customer Service & Support.

Description

Bug ID

1060812

Inline IPS botnet does not work for transparent proxy.

900546, 1058523

WAD does not match the traffic with IPv6 policy when DNS resolves the result as IPv4.

951150

Cannot block Zoom remote control component of Zoom Meeting with Application Control.

991280, 1081621

FDS firmware update support.

992393

Inline IPS: "dia test app wad 99" does not clear wad_ips process.

996624

Explicit FTP fails to set up data channel in active mode on transparent mode.

1001079

Fix fnbamd memory leak.

1015722, 1054835, 1064758

When tcp-window-type is set to auto-tuning, throughput for single file download speed falls below expectation.

1023394

After login with SSO SAML, facebook.com and twitter.com do not show all the contents.

1035565

Removed transaction from CASB GUI when saving profiles

1037801

Generated or cached http resp_time is 0 when request traffic or server response traffic is blocked by FortiProxy.

1038636

DNS filter feature is not controlled by the license seat limit.

1038681

SMTP traffic exceeding session limit is not bypassed.

1040408, 1074022

Associate all UTM logs with http-transaction log for cert-inspect HTTPS traffic.

1040870

log-http-transaction configuration is lost after upgrade.

1041622, 1061742

Explicit FTPS not working over SOCKS proxy.

1044444

Kerberos authentication failure.

1049032

Unexpected logged kernel warnings.

1049306, 1069649

Log disk usage is not visible when Security fabric is enabled.

1052246

Frequent WAD crash in system even log.

1055028

For form authentication, sometimes the browser sends out another request when the form is in process.

1055605

Windows AD cross-forest support for Kerberos authentication.

1057280

Detail of IPS Sensor is blank after adding Signature in the GUI.

1057442

Fix WAD memory leak at CASB and forward server.

1058977

Duplicate security events when log-http-transaction is enabled.

1059663

Access issue with dedicated-to management interface in HA mode in transparent mode.

1060061

Requests fails to match a policy if the destination address is a simple FQDN address.

1060240

Cannot format all storage disks using the "exe disk format all" command on VM platforms. Only individual disk format option works.

1060554, 1062143

Cannot add device with IPv6 address.

1060812

If other UTM features are enabled, the IPS sensor's set scan-botnet-connections block will not work.

1062643

Image analysis replacement image is not updated after changing image content in "config system replacemsg-image".

1063368

HTTPS matches policy with interface to the fw-server instead of interface routed to destination server.

1063373

HA config-sync out of sync due to mismatch rule.fmwp.

1063624

Add FortiProxy synchronization scripts.

1064065

FortiProxy enters memory conserve mode.

1066013

Aggregate interface and all related interfaces flap when any of the aggregate interface configuration is changed.

1066209

SNMP MIB file check failure for FPX-4000G.

1066538

WAD process should set pipe debug log to serial console by default.

1067097

When an image analysis profile is configured, image blocking fails after the first attempt.

1067232

SAML authentication intermittent failure "403 Forbidden error".

1067982

Add compile option to enable kernel debug features.

1068055

Remove duplicate code.

1068729

Wad crashes at wad_http_session_get_from_msg.

1068789

OCR detection failure due toconcatenation of strings without adding delimiters.

1069235

Replaced certificate does not take effect immediately.

1070150

diag debug reset does not clear WAD debug.

1070236

Wanopt ports 7810 and 7802are always exposedeven when no wanopt profile is enabled.

1070445

Credit card numbers are blocked only when separated by a new line.

1071424

Support UEFI boot option for KVM and AWS FortiProxy VMs.

1072123

Remove core dump from code base.

1072282

ICAP error "Unsupport resp code: 400".

1072362

PBRs stop working after network configuration changes.

1072437

WAD memory leak.

1072626

Cannot access a website with http header "timing-allow-origin" when strict-web-check is enabled.

1073639

HTTP3 does not work.

1074087

Logging details are not detected as ICAP when the FortiProxy is used as a local ICAP server.

1074104

DLP is not "Blocked" when the FortiProxy is acting as ICAP local server and Traffic is initiated from a FortiGate.

1074211

CPU easily reaches 100% usage by WAD worker when captive-portal and cors-stateful are enabled.

1074704

diagnose wad debug show generates wrong results.

1076642

Unable to load pages of Cloudflare-protected websites with authentication enabled with authentication scheme set to form-based in explicit proxy.

1076665, 1076754, 1078856, 1079149

Form based user authentication WAD crash.

1077347

Web proxy and SOCKS forward server blocked by domain fronting check.

1078390

Adjust memcpy buffer size based on the destination buffer sizes.

1078472

HA works only under NAT mode, not under transparent mode.

1079602

Add Web Forwarding Server column on policy.

1080223

casb-profile does not cause redirect.

1080415

"Archive Block" configuration in the antivirus profile is not same between the CLI and GUI.

1081379

Add statistics for recording partially initialized unix buffer.

1081860, 1087572

Fix GUI field errors on the Router Policy page.

1081878

WAD crash in wad_ssl_unsupport_block_check.

1082472, 1085048

Fix crashes related to ia blocked image memory cache.

1082989, 1086539

Fix firewall internet service related CLI and fix policy based routing with internet service.

1083610

Fix NTP using HA management interface.

1087166

Fix configuration error log observed after upgrading.

Common vulnerabilities and exposures

FortiProxy 7.4.6 is no longer vulnerable to the following CVE references. Visit https://fortiguard.com/psirt for more information.

Bug ID

CVE reference

1071699

CVE-2024-54021

1060903

CVE-2024-48884 and CVE-2024-48885

Resolved issues

Resolved issues

The following issues have been fixed in FortiProxy 7.4.6. For inquiries about a particular bug, please contact Customer Service & Support.

Description

Bug ID

1060812

Inline IPS botnet does not work for transparent proxy.

900546, 1058523

WAD does not match the traffic with IPv6 policy when DNS resolves the result as IPv4.

951150

Cannot block Zoom remote control component of Zoom Meeting with Application Control.

991280, 1081621

FDS firmware update support.

992393

Inline IPS: "dia test app wad 99" does not clear wad_ips process.

996624

Explicit FTP fails to set up data channel in active mode on transparent mode.

1001079

Fix fnbamd memory leak.

1015722, 1054835, 1064758

When tcp-window-type is set to auto-tuning, throughput for single file download speed falls below expectation.

1023394

After login with SSO SAML, facebook.com and twitter.com do not show all the contents.

1035565

Removed transaction from CASB GUI when saving profiles

1037801

Generated or cached http resp_time is 0 when request traffic or server response traffic is blocked by FortiProxy.

1038636

DNS filter feature is not controlled by the license seat limit.

1038681

SMTP traffic exceeding session limit is not bypassed.

1040408, 1074022

Associate all UTM logs with http-transaction log for cert-inspect HTTPS traffic.

1040870

log-http-transaction configuration is lost after upgrade.

1041622, 1061742

Explicit FTPS not working over SOCKS proxy.

1044444

Kerberos authentication failure.

1049032

Unexpected logged kernel warnings.

1049306, 1069649

Log disk usage is not visible when Security fabric is enabled.

1052246

Frequent WAD crash in system even log.

1055028

For form authentication, sometimes the browser sends out another request when the form is in process.

1055605

Windows AD cross-forest support for Kerberos authentication.

1057280

Detail of IPS Sensor is blank after adding Signature in the GUI.

1057442

Fix WAD memory leak at CASB and forward server.

1058977

Duplicate security events when log-http-transaction is enabled.

1059663

Access issue with dedicated-to management interface in HA mode in transparent mode.

1060061

Requests fails to match a policy if the destination address is a simple FQDN address.

1060240

Cannot format all storage disks using the "exe disk format all" command on VM platforms. Only individual disk format option works.

1060554, 1062143

Cannot add device with IPv6 address.

1060812

If other UTM features are enabled, the IPS sensor's set scan-botnet-connections block will not work.

1062643

Image analysis replacement image is not updated after changing image content in "config system replacemsg-image".

1063368

HTTPS matches policy with interface to the fw-server instead of interface routed to destination server.

1063373

HA config-sync out of sync due to mismatch rule.fmwp.

1063624

Add FortiProxy synchronization scripts.

1064065

FortiProxy enters memory conserve mode.

1066013

Aggregate interface and all related interfaces flap when any of the aggregate interface configuration is changed.

1066209

SNMP MIB file check failure for FPX-4000G.

1066538

WAD process should set pipe debug log to serial console by default.

1067097

When an image analysis profile is configured, image blocking fails after the first attempt.

1067232

SAML authentication intermittent failure "403 Forbidden error".

1067982

Add compile option to enable kernel debug features.

1068055

Remove duplicate code.

1068729

Wad crashes at wad_http_session_get_from_msg.

1068789

OCR detection failure due toconcatenation of strings without adding delimiters.

1069235

Replaced certificate does not take effect immediately.

1070150

diag debug reset does not clear WAD debug.

1070236

Wanopt ports 7810 and 7802are always exposedeven when no wanopt profile is enabled.

1070445

Credit card numbers are blocked only when separated by a new line.

1071424

Support UEFI boot option for KVM and AWS FortiProxy VMs.

1072123

Remove core dump from code base.

1072282

ICAP error "Unsupport resp code: 400".

1072362

PBRs stop working after network configuration changes.

1072437

WAD memory leak.

1072626

Cannot access a website with http header "timing-allow-origin" when strict-web-check is enabled.

1073639

HTTP3 does not work.

1074087

Logging details are not detected as ICAP when the FortiProxy is used as a local ICAP server.

1074104

DLP is not "Blocked" when the FortiProxy is acting as ICAP local server and Traffic is initiated from a FortiGate.

1074211

CPU easily reaches 100% usage by WAD worker when captive-portal and cors-stateful are enabled.

1074704

diagnose wad debug show generates wrong results.

1076642

Unable to load pages of Cloudflare-protected websites with authentication enabled with authentication scheme set to form-based in explicit proxy.

1076665, 1076754, 1078856, 1079149

Form based user authentication WAD crash.

1077347

Web proxy and SOCKS forward server blocked by domain fronting check.

1078390

Adjust memcpy buffer size based on the destination buffer sizes.

1078472

HA works only under NAT mode, not under transparent mode.

1079602

Add Web Forwarding Server column on policy.

1080223

casb-profile does not cause redirect.

1080415

"Archive Block" configuration in the antivirus profile is not same between the CLI and GUI.

1081379

Add statistics for recording partially initialized unix buffer.

1081860, 1087572

Fix GUI field errors on the Router Policy page.

1081878

WAD crash in wad_ssl_unsupport_block_check.

1082472, 1085048

Fix crashes related to ia blocked image memory cache.

1082989, 1086539

Fix firewall internet service related CLI and fix policy based routing with internet service.

1083610

Fix NTP using HA management interface.

1087166

Fix configuration error log observed after upgrading.

Common vulnerabilities and exposures

FortiProxy 7.4.6 is no longer vulnerable to the following CVE references. Visit https://fortiguard.com/psirt for more information.

Bug ID

CVE reference

1071699

CVE-2024-54021

1060903

CVE-2024-48884 and CVE-2024-48885