Fortinet black logo

Resolved Issues

Resolved Issues

The following issues have been fixed in FortiSandbox 3.2.3. For inquiries about a particular bug, contact Customer Service & Support.

Fabric Integration

Bug ID

Description

688659 Improved intermittent connection issue with the community cloud.
689623 Fixed connectivity issues with FortiClient that randomly gets stalled.

GUI

Bug ID

Description

687401 Fixed wrong CPU data on the System Resource Usage widget.
690948 Fixed logon to the Web GUI with RADIUS two-factor authentication.
690033 Fixed GUI logon using multi-factor authentication with FortiToken.

716577

Fixed login failure with remote wildcard user which includes character '@'.

Scan

Bug ID

Description

687843 Fixed a race condition when processing results from cluster nodes.

686146

Fixed wrong behavior of handling YARA rules with clean risk level of 0 and 1.

System & Security

Bug ID

Description

692151 Fixed high disk usage on FSA-VM environment.

Log & Report

Bug ID

Description

694771 Fixed display issue of long and sub URL.

690564

Fixed syslog format to include host_id after timestamp to conform to RFC.

Common vulnerabilities and exposures

Bug ID

Description

680722

FortiSandbox 3.2.3 is no longer vulnerable to the following CVE Reference:

  • CVE-2021-24010

680723

FortiSandbox 3.2.3 is no longer vulnerable to the following CVE Reference:

  • CVE-2021-26097

675153

FortiSandbox 3.2.3 is no longer vulnerable to the following CVE Reference:

  • CVE-2021-26096

683305

FortiSandbox 3.2.3 is no longer vulnerable to the following CVE Reference:

  • CVE-2021-26098

680720

680785

680787

681362

681363

681364

681630

681633

FortiSandbox 3.2.3 is no longer vulnerable to the following CVE Reference:

  • CVE-2021-24014

680721

FortiSandbox 3.2.3 is no longer vulnerable to the following CVE Reference:

  • CVE-2020-29011

697271

FortiSandbox 3.2.3 is no longer vulnerable to the following CVE Reference:

  • CVE-2021-24010

684391

FortiSandbox 3.2.3 is no longer vulnerable to the following CVE Reference:

  • CVE-2021-26105

Resolved Issues

The following issues have been fixed in FortiSandbox 3.2.3. For inquiries about a particular bug, contact Customer Service & Support.

Fabric Integration

Bug ID

Description

688659 Improved intermittent connection issue with the community cloud.
689623 Fixed connectivity issues with FortiClient that randomly gets stalled.

GUI

Bug ID

Description

687401 Fixed wrong CPU data on the System Resource Usage widget.
690948 Fixed logon to the Web GUI with RADIUS two-factor authentication.
690033 Fixed GUI logon using multi-factor authentication with FortiToken.

716577

Fixed login failure with remote wildcard user which includes character '@'.

Scan

Bug ID

Description

687843 Fixed a race condition when processing results from cluster nodes.

686146

Fixed wrong behavior of handling YARA rules with clean risk level of 0 and 1.

System & Security

Bug ID

Description

692151 Fixed high disk usage on FSA-VM environment.

Log & Report

Bug ID

Description

694771 Fixed display issue of long and sub URL.

690564

Fixed syslog format to include host_id after timestamp to conform to RFC.

Common vulnerabilities and exposures

Bug ID

Description

680722

FortiSandbox 3.2.3 is no longer vulnerable to the following CVE Reference:

  • CVE-2021-24010

680723

FortiSandbox 3.2.3 is no longer vulnerable to the following CVE Reference:

  • CVE-2021-26097

675153

FortiSandbox 3.2.3 is no longer vulnerable to the following CVE Reference:

  • CVE-2021-26096

683305

FortiSandbox 3.2.3 is no longer vulnerable to the following CVE Reference:

  • CVE-2021-26098

680720

680785

680787

681362

681363

681364

681630

681633

FortiSandbox 3.2.3 is no longer vulnerable to the following CVE Reference:

  • CVE-2021-24014

680721

FortiSandbox 3.2.3 is no longer vulnerable to the following CVE Reference:

  • CVE-2020-29011

697271

FortiSandbox 3.2.3 is no longer vulnerable to the following CVE Reference:

  • CVE-2021-24010

684391

FortiSandbox 3.2.3 is no longer vulnerable to the following CVE Reference:

  • CVE-2021-26105