Created on
‎07-05-2023
09:54 PM
Edited on
‎11-20-2025
10:13 PM
By
Jean-Philippe_P
| Description | This article describes the workaround and fix schedule for an issue where the eap-proxy daemon utilizes high CPU after upgrading to FortiOS v7.2.5/v7.4.0 and uses certificate bundle 1.00044/1.00045/1.00046/1.00047. |
| Scope | FortiGate v7.2.1, v7.2.5, v7.4.0. |
| Solution |
After upgrading to FortiOS v7.2.5 or v7.4.0, CPU utilization may be too high after the certificate bundle is upgraded from 1.00043 to 1.00044/1.00045/1.00046/1.00047.
All of the following FortiOS versions are affected:
To identify the daemon that uses a high CPU, run the command below:
diagnose sys top 1
In the following FortiGate that is running on FortiOS v7.2.5, it is observed that the eap_proxy daemon is running on a high CPU:
diagnose sys top 1
To confirm if the eap_proxy is having an issue, proceed to check the crash log with the following command:
diagnose deb crashlog read
The eap-proxy has been restarting every few seconds:
diagnose debug crashlog read
If FortiGate had recently upgraded the certificate bundle from 1.00043 to 1.00044, 1.00045, 1.00046, or 1.00047, the respective version matches a known bug. It is then necessary to check the certificate bundle version with the following command:
The trigger condition is not tied to certain certificate bundle versions. Any certificate bundle version upgrade can potentially trigger this behavior.
diagnose autoupdate versions | grep -A6 "Certificate"
If all three of the symptoms match, it would be a match to bug 923164 documented in the FortiOS v7.4.0 release note:
Workaround: Reboot FortiGate or restart the eap_proxy process in the CLI:
fnsysctl killall eap_proxy
To kill the process using the process ID, execute the following commands to find and kill the process:
diagnose sys process pidof eap_proxy diagnose sys kill 11 <process_id>
Solution:
|
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.