Resolved issues
This section lists issues that have been fixed in version 7.6.7. For inquires about a particular bug, please contact Fortinet Customer Service & Support: https://support.fortinet.com
| Bug ID | Description |
|---|---|
| 1247700 | In True Transparent Proxy (TTP) mode, random members are dropped from server pools due to index corruption, specifically unsafe server slot reuse and index validation errors during configuration reloads. This mismanagement in the proxy engine occurs when a pool member is modified, resulting in traffic bypassing security policies and backend servers presenting certificates directly to clients. |
| 1244764 | "FortiWeb DLDB is unauthorized" event logs are incorrectly generated on devices without a Data Leak Prevention (DLP) license. This issue results from the update daemon attempting to validate the Data Leakage Database (DLDB) contract status and logging a failure despite the service not being purchased or enabled. |
| 1243541 | In monitor mode, high memory usage occurs within the proxyd process when the HTTP Protocol Constraint (HPC) module encounters malformed requests. This depletion of system memory is caused by the HPC module triggering custom error responses for abnormal traffic while the proxy engine fails to parse or release the response context under monitor mode constraints. |
| 1237459 | IP group imports through the GUI fail without a visible error message when the destination group name contains spaces. This issue occurs because the CGI API incorrectly parses the management key (mkey) as only the first string before the whitespace rather than the full name, causing the system to attempt the import on a non-existent group. |
| 1237071 | Automation stitches configured to trigger based on specific Attack Log signature IDs fail to execute or send notifications. This failure is caused by a matching logic error within the automation daemon that prevents the stitch from correctly identifying and responding to individual signature ID matches, even when the signature is correctly logged in the system. |
| 1236889 | The GUI incorrectly displays a "Cipher must be selected" error when users attempt to change or save the SSL Ciphers Group in a server policy. This validation error occurs because the web interface mistakenly requires entries to be present in the Customized encryption level list, even when a predefined or custom SSL Ciphers Group is already selected and enabled. |
| 1236073 | Remote TACACS+ users are restricted to a maximum of 16 assigned Administrative Domains (ADOMs). This limit prevents administrators from granting access to all required domains in large-scale deployments, such as MSSP environments. While the CLI enforces this 16-entry maximum, the GUI fails to provide a corrective warning when the limit is exceeded. |
| 1233160 | After a reboot triggered by operations such as applying a new VM license, the admin account password could be reset to the default value, and in some cases remote administrator entries were removed. The issue was caused by the configuration save process incorrectly restoring the admin user during cmf_write_all_config. |
| 1232851 | URL rewrite rules fail to modify response headers, such as the Location header, when the server response body is empty. This issue occurs because the URL rewrite module incorrectly blocks all rewrite operations for responses with a body size of zero, preventing necessary header transformations (e.g., rewriting HTTP to HTTPS) even when the regex patterns match successfully. |
| 1232808 | Periodic CPU spikes occur during background Redis data persistence, particularly in high-traffic environments. This performance degradation is caused by the RDB compression mechanism consuming excessive CPU resources while saving client management data to disk. These intermittent spikes can reach critical levels on the primary unit in HA clusters, leading to resource exhaustion. |
|
1228318 |
Report generation could stall at 1% due to a crash in the reportd process when processing Attack Details data. |
|
1228155 |
In certain cases, the Web Vulnerability Scan (WVS) runtime directory was initialized in an incorrect filesystem path ( |
|
1226243 |
FortiWeb experienced high memory consumption due to a memory leak in |
|
1225626 |
Remote administrator logins using RADIUS experienced GUI failures. In HA mode, the secondary unit rejected API calls because the access profile name was not passed correctly, causing the GUI to log out when loading HA Topology. An input-validation error also caused widget actions to fail. |
|
1224444 |
In some deployments using 10-Gbps i40e interfaces, a link-down event on one v-zone member did not propagate to the other port. Although FortiWeb reported the interface as down, the physical link remained active, preventing expected failover behavior. The issue was caused by the i40e driver not bringing down the PHY on interface close. The driver has been updated to ensure v-zone members drop link correctly when any member fails. |
|
1222647 |
When the Login Disclaimer banner is enabled, the GUI becomes inaccessible and returns an Important: FIPS users are advised not to upgrade to this release, as the login disclaimer cannot be disabled in FIPS mode. Upgrading under these conditions results in loss of GUI access, leaving only SSH and console access available. |
|
1220604 |
In True Transparent Proxy (TTP) mode, significant latency occurs during OCSP and TSP traffic forwarding, leading to client timeouts. This delay is caused by a processing bottleneck in the URL record module, where the proxy engine stalls while managing a large SQLite3 database of learned URLs. Under high-volume traffic, this database interaction prevents the timely transfer of packets between frontend and backend interfaces. |
|
1217916 |
The proxyd process crashes during HA failover or |
|
1215779 |
OFTP log forwarding did not resume after the connection to FortiAnalyzer was disrupted. The OFTP client failed to re-establish the transport session following events such as a FortiAnalyzer reboot or HA role change, leaving the session in a persistent “not ready” state and causing logs to remain queued rather than forwarded. |
|
1212635 |
The proxyd process became unresponsive due to a client-management operation that performed slow Redis writes while holding a lock. This caused the proxy to hang, preventing traffic from being processed until the unit rebooted or failed over. |
|
1209339 |
FortiWeb failed to authenticate administrators using FortiCloud SSO on some appliances with identical firmware. The SAML login process stopped due to missing certificate handling, preventing completion of the FortiCloud SSO flow. |
|
1207216 |
When the HTTP Header Security (HHS) module was enabled with no rules configured, FortiWeb continued to buffer response data, which caused Server-Sent Events (SSE) responses to be dropped. |
|
1200770 |
FortiWeb reset HTTP/2 requests when content routing was enabled. Under high HTTP/2 request rates, the Session Management module incorrectly counted individual requests as separate TCP connections, causing the request counter to accumulate and triggering period-block actions. This resulted in unexpected connection resets for all routed hosts. |
|
1194449 |
Customized column settings in the Attack Log page were not retained when viewing archived log files. Opening logs through Log Management caused the column configuration to revert to default. |