Resolved issues
This section lists issues that have been fixed in version 8.0.3. For inquires about a particular bug, please contact Fortinet Customer Service & Support: https://support.fortinet.com
| Bug ID | Description |
|---|---|
| 1161319 | certd may stop checking for expiring certificates due to file descriptor leaks caused by unfreed BIO objects, leading to a silent failure until the process is restarted. |
| 1165918 | Pasting multiple IP addresses into the Source filter field on the Attack Log page produced empty results. The filter logic did not correctly interpret pasted entries as separate values. A note has been added to the GUI log pages explaining how to manually use the OR operator when entering multiple filter conditions. |
| 1177864 | Traffic did not fail over when using scripting-based load balancing. When a server returned an HTTP 503 response, subsequent requests continued to be sent to the same server because Lua persistence entries could not be removed. |
|
1178228 |
Changes to signature exceptions may not apply immediately under high traffic. The update takes effect only after a delay or after HA failover. The issue is caused by configuration writer starvation under the current locking mechanism. |
|
1194449 |
Customized column settings in the Attack Log page were not retained when viewing archived log files. Opening logs through Log Management caused the column configuration to revert to default. |
|
1197768 |
FortiWeb generated incorrect event log entries for administrator login failures from untrusted hosts. When multiple administrator accounts were configured with trust host restrictions, the system logged failed login attempts under other valid usernames due to a loop error in the trust host verification logic. |
|
1200770 |
FortiWeb reset HTTP/2 requests when content routing was enabled. Under high HTTP/2 request rates, the Session Management module incorrectly counted individual requests as separate TCP connections, causing the request counter to accumulate and triggering period-block actions. This resulted in unexpected connection resets for all routed hosts. |
|
1207216 |
When the HTTP Header Security (HHS) module was enabled with no rules configured, FortiWeb continued to buffer response data, which caused Server-Sent Events (SSE) responses to be dropped. |
|
1208900 |
FortiWeb allowed the use of weak SSH MAC algorithms umac-128-etm@openssh.com and umac-128@openssh.com. These algorithms have been removed from the supported MAC list to ensure compliance with cryptographic security standards such as PCI DSS. |
|
1209339 |
FortiWeb failed to authenticate administrators using FortiCloud SSO on some appliances with identical firmware. The SAML login process stopped due to missing certificate handling, preventing completion of the FortiCloud SSO flow. |
|
1212297 |
FortiWeb blocked gRPC responses due to incorrect handling of HTTP/2 frame sequences. When a response included headers followed by trailers without an intervening data frame, FortiWeb generated an invalid 0-byte DATA frame with the EndStream flag set, causing the trailing header frame to be dropped and preventing the response from reaching the client. |
|
1212635/ 1220457 |
The |
|
1212693 |
FortiWeb did not include the Host header when forwarding requests to an ICAP server, causing downstream ICAP systems to receive incomplete contextual information. |
|
1214406 |
FortiWeb returned intermittent HTTP 503 errors when processing multiple HTTP/1.1 requests over the same client connection. If consecutive requests matched different content-routing rules or backend pools, FortiWeb incorrectly reused the previous upstream connection instead of opening a new one, causing routing failures. |
|
1215779 |
OFTP log forwarding did not resume after the connection to FortiAnalyzer was disrupted. The OFTP client failed to re-establish the transport session following events such as a FortiAnalyzer reboot or HA role change, leaving the session in a persistent “not ready” state and causing logs to remain queued rather than forwarded. |
|
1219535 |
FortiWeb did not detect SQL injection payloads embedded inside nested JSON strings. When the SQL expression appeared within an escaped JSON value, the signature engine matched the payload but the False Positive Mitigation (FPM) stage incorrectly classified it as benign, resulting in the attack not being blocked. |
|
1222647 |
When the Login Disclaimer banner is enabled, the GUI becomes inaccessible and returns an Important: FIPS users are advised not to upgrade to this release, as the login disclaimer cannot be disabled in FIPS mode. Upgrading under these conditions results in loss of GUI access, leaving only SSH and console access available. |
|
1224444 |
In some deployments using 10-Gbps i40e interfaces, a link-down event on one v-zone member did not propagate to the other port. Although FortiWeb reported the interface as down, the physical link remained active, preventing expected failover behavior. The issue was caused by the i40e driver not bringing down the PHY on interface close. The driver has been updated to ensure v-zone members drop link correctly when any member fails. |
|
1225626 |
Remote administrator logins using RADIUS experienced GUI failures. In HA mode, the secondary unit rejected API calls because the access profile name was not passed correctly, causing the GUI to log out when loading HA Topology. An input-validation error also caused widget actions to fail. |
|
1226243 |
FortiWeb experienced high memory consumption due to a memory leak in |
|
1228155 |
In certain cases, the Web Vulnerability Scan (WVS) runtime directory was initialized in an incorrect filesystem path ( |
|
1228318 |
Report generation could stall at 1% due to a crash in the |
|
1231821/1231926 |
Intermittent server-to-server communication failures were caused by crashes in the |
| 1233160 |
After a reboot triggered by operations such as applying a new VM license, the admin account password could be reset to the default value, and in some cases remote administrator entries were removed. The issue was caused by the configuration save process incorrectly restoring the admin user during |