Fortinet black logo

Resolved issues

Resolved issues

The following issues have been fixed in FortiSwitchOS 7.2.0. For inquiries about a particular bug, please contact Customer Service & Support.

Bug ID Description

724558

A flash module failed and caused a complete network outage.

724813 The set enforce-first-as {disable | enable} command should have been placed under config neighbor and does not work in its current location (directly under config router bgp). There is no patch available for this issue.

741354

There is a segmentation fault when a packet is received for a deleted interface before the DHCP client module has removed that interface.

743749

When the network hub is disconnected and then reconnected, MAB sometimes does not work.

746584

An FS-448D cannot be access on an intermittent basis.

748177

When the network monitor is enabled, the MCLAG trunk becomes unstable.

748249

New CLI commands have been added under the config switch security command to control TCP and UDP ports.

752085

When the FortiSwitch unit sends the BPDU with the proposal bit on, it causes STP to be unsynchronized.

753630

MAB cannot be recovered after the daemon for 802.1x port-based authentication has crashed.

754232

Some FS-224D-FPOE switches have problems with checking the PSU GPIO.

759992

After the FortiSwitch unit is restarted, the memory usage increases, and users cannot access the FortiSwitch unit with the CLI or GUI.

760536

The SNMP trap for the power supply failing or being restored is using the wrong OID.

763264 Displaying the Switch > Port > Physical page or the dashboard causes high CPU usage.

763953

After the LDAP authentication succeeds, there is a “wrong username and password” error.

769733

The getnext query needs to be supported for OID .0/0.0.

771767

The switch cannot be accessed if the trusted host is not using /32.

787797

The FortiSwitch unit does not allow VTP traffic between Cisco switches.

796030

There is no response when SNMP polls a loopback interface.

Common vulnerabilities and exposures

FortiSwitchOS 7.2.0 is no longer vulnerable to the following CVEs:

  • CWE-190

  • CWE-347

  • CWE-352

  • CWE-610

  • CWE-788

Visit https://fortiguard.com/psirt for more information.

Resolved issues

The following issues have been fixed in FortiSwitchOS 7.2.0. For inquiries about a particular bug, please contact Customer Service & Support.

Bug ID Description

724558

A flash module failed and caused a complete network outage.

724813 The set enforce-first-as {disable | enable} command should have been placed under config neighbor and does not work in its current location (directly under config router bgp). There is no patch available for this issue.

741354

There is a segmentation fault when a packet is received for a deleted interface before the DHCP client module has removed that interface.

743749

When the network hub is disconnected and then reconnected, MAB sometimes does not work.

746584

An FS-448D cannot be access on an intermittent basis.

748177

When the network monitor is enabled, the MCLAG trunk becomes unstable.

748249

New CLI commands have been added under the config switch security command to control TCP and UDP ports.

752085

When the FortiSwitch unit sends the BPDU with the proposal bit on, it causes STP to be unsynchronized.

753630

MAB cannot be recovered after the daemon for 802.1x port-based authentication has crashed.

754232

Some FS-224D-FPOE switches have problems with checking the PSU GPIO.

759992

After the FortiSwitch unit is restarted, the memory usage increases, and users cannot access the FortiSwitch unit with the CLI or GUI.

760536

The SNMP trap for the power supply failing or being restored is using the wrong OID.

763264 Displaying the Switch > Port > Physical page or the dashboard causes high CPU usage.

763953

After the LDAP authentication succeeds, there is a “wrong username and password” error.

769733

The getnext query needs to be supported for OID .0/0.0.

771767

The switch cannot be accessed if the trusted host is not using /32.

787797

The FortiSwitch unit does not allow VTP traffic between Cisco switches.

796030

There is no response when SNMP polls a loopback interface.

Common vulnerabilities and exposures

FortiSwitchOS 7.2.0 is no longer vulnerable to the following CVEs:

  • CWE-190

  • CWE-347

  • CWE-352

  • CWE-610

  • CWE-788

Visit https://fortiguard.com/psirt for more information.