I have Forti devices with the 7.2.x firmware family, and i'm planning security updates to mitigate vulnerabilities. However, the PSIRT vulnerabilities site recommend migrate to 7.4.x family to fix them, and in some cases, the vulnerabilities in that family suggest migrate to 7.6.x.
From your experience, are these family versions stable? Or do they have a lot of bugs?
The newer trains are generally acceptable if you're coming from 7.2.x, but there are a few things to be aware of.
The later patches are stable enough for production, and 7.4.x has developed significantly. The typical bugs are present, but nothing unusual.
Since 7.6.x is still relatively new, it can be a little rough around the edges and receives fixes more frequently. I would only upgrade to 7.6.x if 7.4.x doesn't have the precise PSIRT fixes you require.
Use the most recent 7.4.x patch for the time being and switch to 7.6.x after it settles if stability is your top priority.
You just described yesterday for me. I'm using forticlient version 7.2.8 on Fortios 7.2.10 and no matter the config I couldn't get auth to work at all. If I only used psk, it would connect, but no split tunneling. Reviewing route print showed it always full tunneled regardless of config. I don't understand how they can be forcing a solution that isn't mature and recommending a Fortios version that breaks fundamental features.
Hello Camran,
Which vulnerability are you referring to? Since the 7.2.x branch is already out of engineering support, that vulnerability may not be fixed in this release. In the meantime, you can refer to the documentation below to find the recommended FortiOS version for your FGT.
| User | Count |
|---|---|
| 2803 | |
| 1425 | |
| 812 | |
| 750 | |
| 455 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.