Download our ungated guide to high-quality penetration testing.

As part of UpKeep, our new feature to keep our NWG Manage customers' devices on the latest stable version, we reviewed the latest Fortinet releases and recommend an upgrade to FortiOS 7.4.8 for all supported devices. More details below.
Even if we're not managing Fortinet devices for you, we want you to have the latest information to help keep your devices secure.
Fortinet recommends FortiOS 7.4.8.
Fortinet does not currently recommend any of the 7.6.X code train for use. While there are new features, the bugs identified create a much larger risk to production environments.
Bug ID: 965217
Description: In an HA configuration, FortiGate may experience intermittent heartbeat loss causing unexpected failover to the secondary unit.
Bug ID: 995912
Description: After a firmware upgrade, some VPN tunnels experience intermittent signal disruptions causing traffic to be re-routed.
NWG does not recommend using FortiOS 7.6.X on any Fortinet devices.
This is the newest release of FortiOS. FortiOS 7.4.9 has a new feature that has caused authentication outages with SAML configurations. This change in default behavior verifies the signature for SAML response messages. This means that configurations must be made to the SAML IdP to sign SAML responses and assertions. While providers such as Azure can be reconfigured to work properly, the only workaround for other IdPs (such as Google) is to downgrade to FortiOS 7.4.8.
On lower-end models (50G, 70G, 90G, and their variants), SSL VPN web and tunnel modes are no longer available, and any previous configuration will not be migrated during an upgrade. The workaround for this is to transition to IPSec for Remote Access VPN, but this requires planning due to changes required on the Firewall and to FortiClients.
In addition to the above SAML concerns, there are many new Hyperscale issues and limitations that have been identified.
NWG does not recommend 7.4.9 at this time.
Release notes for 7.4.8 previously showed some potentially severe issues. The new known issues in 7.4.8 are listed below. Version 7.4.8 resolves 2 medium and one low severity vulnerabilities (CVE-2025-25250, CVE-2024-52963, and CVE-2025-24471). NWG has not experienced the known issues listed below. The known issues were noticed under extreme load in lab testing and do not correlate to real-world environments. NWG recommends FortiOS 7.4.8 for all supported devices.
Bug ID: 1033083
Description: HA sessions are not properly synchronized, causing a high number of sessions on the primary unit, and the standby unit enters conserve mode.
Bug ID: 1101897
Description: VPN traffic sent bytes spike to anomalous levels within 10 minutes.
Bug ID: 1125487
Description: Autoconnect to IPsec VPN using Entra ID logon fails when there are multiple IPsec tunnels.
Bug ID: 1164811
Description: SSL VPN web mode showing Access Denied error after upgrade on 2GB models.
FortiOS 7.4.7 does not show any severe, potentially service-impacting issues. It also resolves 1 critical and 1 medium vulnerability (CVE-2025-22252 and CVE-2025-22254).
NWG recommends FortiOS 7.4.8 for all supported devices.
FortiOS 7.2.12 has a new feature that has caused authentication outages with SAML configurations. This change in default behavior verifies the signature for SAML response messages. This means that configurations must be made to the SAML IdP to sign SAML responses and assertions. While providers such as Azure can be reconfigured to work properly, the only workaround for other IdPs (such as Google) is to downgrade to FortiOS 7.2.11.
Fortinet recommends version 7.2.11. There are no severe new issues identified in the 7.2.11 release over previous releases. Most new issues are either GUI issues or model-specific bugs that have workarounds. The only new features are more secure administrator password hashing and improved CPU performance when updating the IPS database. FortiOS 7.2.11 also resolves 1 high, 1 medium, and 1 low severity vulnerabilities (CVE-2024-52965, CVE-2025-22254, and CVE-2024-52963).
NWG recommends FortiOS 7.2.11 for all compatible devices that are not capable of running FortiOS 7.4.
Fortinet recommends FortiOS 6.2.16. There are no new known issues with 6.2.16. There are also no new features. There are 1 critical and 3 high vulnerabilities resolved in 6.2.16 (CVE-2024-21762, CVE-2024-23110, CVE-2023-36639, and CVE-2023-41677).
NWG recommends FortiOS 6.2.16 for devices that are not capable of running 7.2 or 7.4. Note that devices that cannot run firmware higher than 6.2 are in the end-of-life lifecycle and should be replaced.
Security news, tips, webinars, and more straight to your inbox.