Join us in Orlando, October 14-16, for the VISIONS CIO Summit, hosted by Quartz Network. Be our guest when you use code NWG-VIP.
As part of UpKeep, our new feature to keep our NWG Manage customers' devices on the latest stable version, we reviewed the latest Fortinet releases and recommend an upgrade to FortiOS 7.4.7 for all supported devices. More details below.
Even if we're not managing Fortinet devices for you, we want you to have the latest information to help keep your devices secure.
Fortinet recommends FortiOS 7.4.7.
Fortinet does not currently recommend any of the 7.6.X code train for use. While there are new features, the bugs identified create a much larger risk to production environments.
Bug ID: 965217
Description: In an HA configuration, FortiGate may experience intermittent heartbeat loss causing unexpected failover to the secondary unit.
Bug ID: 995912
Description: After a firmware upgrade, some VPN tunnels experience intermittent signal disruptions causing traffic to be re-routed.
NWG does not recommend using FortiOS 7.6.X on any Fortinet devices.
The current Fortinet recommended version is 7.4.7. FortiOS 7.4.7 does not show any severe, potentially service-impacting issues. It also resolves 1 critical and 1 medium vulnerability (CVE-2025-22252 and CVE-2025-22254).
Release notes for 7.4.8 show some potentially severe known issues. Because of these issues, we do not recommend 7.4.8 for production deployment. The new known issues in 7.4.8 are listed below. There are no feature updates that are overly beneficial to NWG customers. Version 7.4.8 resolves 2 medium and one low severity vulnerabilities (CVE-2025-25250, CVE-2024-52963, and CVE-2025-24471).
Bug ID: 1033083
Description: HA sessions are not properly synchronized, causing a high number of sessions on the primary unit, and the standby unit enters conserve mode.
Bug ID: 1101897
Description: VPN traffic sent bytes spike to anomalous levels within 10 minutes.
Bug ID: 1125487
Description: Autoconnect to IPsec VPN using Entra ID logon fails when there are multiple IPsec tunnels.
Bug ID: 1164811
Description: SSL VPN web mode showing Access Denied error after upgrade on 2GB models.
NWG recommends FortiOS 7.4.7 for all supported devices.
Fortinet recommends version 7.2.11. There are no severe new issues identified in the 7.2.11 release over previous releases. Most new issues are either GUI issues or model-specific bugs that have workarounds. The only new features are more secure administrator password hashing and improved CPU performance when updating the IPS database. FortiOS 7.2.11 also resolves 1 high, 1 medium, and 1 low severity vulnerabilities (CVE-2024-52965, CVE-2025-22254, and CVE-2024-52963).
NWG recommends FortiOS 7.2.11 for all compatible devices that are not capable of running FortiOS 7.4.
Fortinet recommends FortiOS 6.2.16. There are no new known issues with 6.2.16. There are also no new features. There are 1 critical and 3 high vulnerabilities resolved in 6.2.16 (CVE-2024-21762, CVE-2024-23110, CVE-2023-36639, and CVE-2023-41677).
NWG recommends FortiOS 6.2.16 for devices that are not capable of running 7.2 or 7.4. Note that devices that cannot run firmware higher than 6.2 are in the end-of-life lifecycle and should be replaced.
Security news, tips, webinars, and more straight to your inbox.