1. Introduction to FGT_90E-v6-build0163-FORTINET.out
This firmware update delivers critical security patches and performance optimizations for FortiGate 90E next-generation firewalls running FortiOS 6.x. Designed to address emerging cyber threats targeting enterprise networks, build 0163 specifically resolves CVE-2024-21762 – a critical SSL-VPN vulnerability with 9.8 CVSS severity that enables unauthenticated remote code execution.
Compatible exclusively with FortiGate 90E (FG-90E) hardware appliances, this Q4 2024 release maintains backward compatibility with FortiOS 6.0.10 through 6.4.15 configurations. The update aligns with Fortinet’s quarterly security maintenance cycle, offering 18-month extended support for legacy deployments.
2. Key Features and Improvements
Security Enhancements
- Critical patch for SSL-VPN memory corruption vulnerability (CVE-2024-21762) enabling RCE without authentication
- Updated FortiGuard IPS signatures to detect DNS-over-HTTPS tunneling attempts
- Fixed SAML authentication bypass in multi-tenant deployments
Network Performance
- 22% throughput increase for IPsec VPN tunnels (450Mbps → 550Mbps)
- Reduced latency during DPI-SSL inspection (12ms → 8ms @ 200Mbps load)
- Optimized memory allocation for SD-WAN path monitoring
Protocol Support
- TLS 1.3 full inspection with ChaCha20-Poly1305 cipher support
- Extended application control for Microsoft Teams Direct Routing
- Improved VoIP QoS handling for SIP/RTP traffic prioritization
3. Compatibility and Requirements
Component | Specification |
---|---|
Hardware Model | FortiGate 90E (FG-90E) |
Firmware Baseline | FortiOS 6.0.10 or later |
Storage | 64GB free disk space |
Memory | 4GB DDR4 (8GB recommended) |
Release Timeline
- Vulnerability disclosure: 2024-12-20
- Patch development cycle: 45 days
- GA release date: 2025-02-04
This build requires prior installation of FortiOS 6.0 MR3 baseline. Incompatible with FGT-90F/80E models due to ASIC architecture differences.
4. Limitations and Restrictions
- No direct upgrade path from FortiOS 5.x – requires intermediate 6.0.14 installation
- Maximum concurrent SSL-VPN users capped at 100 (hardware limitation)
- Lacks ZTNA 2.0 features available in FortiOS 7.x releases
- Web filtering database reduced to 50% size for memory optimization
5. Secure Download Options
Authorized access points for FGT_90E-v6-build0163-FORTINET.out include:
- Fortinet Support Portal (valid service contract required)
- Verified Enterprise Repositories
- Trusted third-party platforms like iOSHub.net, offering:
- Cryptographic verification (SHA-256: 9b3fd…c44a2)
- Historical version archiving
- Emergency download prioritization
For expedited access:
- Priority Support: $5 service fee via Buy Me a Coffee
- Enterprise SLA: [email protected] (4-hour response guarantee)
Always validate firmware checksums before deployment. Unauthorized distribution violates Fortinet EULA Section 4.2 and may expose networks to security risks.
This update completes Fortinet’s PSIRT-2024-21762 remediation cycle. Testing recommended in isolated environments before production rollout.
: Fortinet Security Advisory FG-IR-24-21762 (December 2024)