Hi there,
On entry-level FortiGate models, the SSL-VPN web portal breaks after the update to FortiOS 7.4.8.
Update 2
diagnose debug console timestamp enable
diagnose debug application sslvpn -1
diagnose debug application fnbamd -1
diagnose debug enable
2025-06-05 11:17:43 [17810:root:4]fsv_check_path_passed:997 No access: check path failed /migadmin/rmt_index.html, /data/migadmin, /migadmin 2025-06-05 11:17:43 [17810:root:4]sslvpn_zip_handler:136 sslvpn check path failed. 2025-06-05 11:17:43 [17810:root:4]fsv_check_path_passed:997 No access: check path failed /migadmin/sslvpn/css/ssl_style.css, /data/migadmin/sslvpn/css, /migadmin/sslvpn/css 2025-06-05 11:17:43 [17810:root:4]sslvpn_zip_handler:136 sslvpn check path failed.
Update 3
The issue has been identified as BUG ID 1164811: https://docs.fortinet.com/document/fortigate/7.4.8/fortios-release-notes/236526/known-issues
Hi Rino
What was your previous version on which it worked?
FortiOS 7.4.7
I can confirm the same behavior on a 60F.
Downgrading to 7.4.7 is a workaround
Downgrading to 7.4.7 for me makes webvpn work. But now i'm unable to manage the device, because my admin credentials have stopped working.
Did you run the command below?
To enhance the security of system administrator passwords, FortiGate now uses PBKDF2 as the hashing scheme with randomized salts to hash and store the password.
To maintain downgrade support, a new command is introduced:
config system password-policy set login-lockout-upon-downgrade {enable | disable} end
No I haven't. And didn't read all of the release notes. So this is something other users should be aware off.
Ok i thought default behaviour would result in problems with downgrade support, however according to this article this shouldn't be the case. And i still have the
Unable to login with local administrator ... - Fortinet Community
Expected lockout behavior:
Beginning in FortiOS v7.2.11, v7.6.1, and upcoming in v7.4.8, the security of stored system administrator passwords has been enhanced in Issue ID# 752946. By default for backward compatibility, the old version of the password is also retained.
The password hash value out of an old config file on 7.2.5 and the value of old-password in the 7.4.8 config backup also don't match. And my guess is these should have matched.
Note: i'm 100% sure the password itself has not changed during this time. And i'm not sharing it for testing in lab environment ;) .
Hi Rino_B
What is your hardware ? Could you share your configuration to my official email bhoang@fortinet.com; I want to reproduce the issue in my lab. Thank you
Regards
Bill
User | Count |
---|---|
2567 | |
1358 | |
796 | |
650 | |
455 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.