DNS type 65 resource record requests bypass DNS filter

Summary

An Improperly Implemented Security Check for Standard vulnerability [CWE-358] in FortiOS and FortiProxy may allow a remote unauthenticated user to bypass the DNS filter via Apple devices.

Version Affected Solution
FortiOS 7.6 7.6.0 Upgrade to 7.6.1 or above
FortiOS 7.4 7.4.0 through 7.4.7 Upgrade to 7.4.8 or above
FortiOS 7.2 7.2.0 through 7.2.10 Upgrade to 7.2.11 or above
FortiOS 7.0 7.0 all versions Migrate to a fixed release
FortiOS 6.4 6.4 all versions Migrate to a fixed release
FortiProxy 7.6 7.6.0 through 7.6.1 Upgrade to 7.6.2 or above
FortiProxy 7.4 7.4.0 through 7.4.8 Upgrade to 7.4.9 or above
FortiProxy 7.2 7.2 all versions Migrate to a fixed release
FortiProxy 7.0 7.0 all versions Migrate to a fixed release
FortiSASE 24.4 24.4.a Fortinet remediated this issue in 24.4.b and hence customers do not need to perform any action.
FortiSASE 23.3 Not affected Not Applicable
FortiSASE 23.2 Not affected Not Applicable
FortiSASE 23.1 Not affected Not Applicable
FortiSASE 22 Not affected Not Applicable
Follow the recommended upgrade path using our tool at: https://docs.fortinet.com/upgrade-tool

Acknowledgement

Internally discovered and reported by Jonathan Hurley from the Fortinet Consulting System Engineer team.

Timeline

2025-07-08: Initial publication