Access Point Firmware Releases
This section provides a release history of firmware for access points managed by WatchGuard Cloud (AP130, AP230W, AP330, AP332CR, AP430CR, AP432).
Latest Release
v2.7.9-0.B714794 — Release Date: 17 April 2025
This firmware update includes these new features, enhancements, and resolved issues:
New Features
This firmware update supports these new features in WatchGuard Cloud:
- Access Point and Wireless Client Visibility Enhancements
- The access point and wireless client monitoring and details pages now include additional visibility data about devices, clients, and connection events.
- Access Point ThreatSync Response Actions (Beta)
- This firmware update supports threat response features in ThreatSync to block client connections to malicious access points.
Enhancements
- New kernel integrity check measures show alerts in WatchGuard Cloud when suspicious files are detected in the access point operating system. [AP-2119]
- The access point reset procedure is updated. To reset the device to factory-default settings, press and hold the reset button for at least 10 seconds or more until all LEDs turn off, then release the button. After a few seconds, the LEDs will show solid red or orange to indicate the device is reset and rebooting to factory-default settings. [AP-2169]
- The access point reboot log is now included in the snapshot diagnostic file. [AP-2200]
- The DNS Lookup diagnostic tool response messages are improved when the hostname does not correctly resolve. [AP-2106]
- Performance is improved when you view the live status of wireless clients. [AP-2214]
- Added support for Thinix Wi-Fi third-party captive portal integration. [AP-2021, WIFI-9568]
Resolved Issues
- In some cases, WatchGuard Cloud managed access points were classified as an Evil Twin by Airspace Monitoring as a false positive detection. [AP-1968]
- Timeout and deployment errors no longer occur when a large number of PPSK are applied to multiple SSIDs. [AP-2096, AP-2267]
- Access points no longer send excessive DHCP requests when client isolation is enabled. [AP-1267, AP-1846]
- In some cases, access points lost their connection then become inaccessible and did not respond to network traffic. The access point now reboots after 30 minutes of detected network inactivity from the LAN interface to try to recover the connection when the device is in this state. [AP-2157, AP-2098, AP-2116]
- Client data from an AP230W about client association time is now correctly sent to the Performance Issues report. [AP-2110]
- The access point local Web UI and CLI now report the correct country of operation for the device. [AP-2117]
- The SSH server is updated to resolve CVE-2023-48795 and CVE-2002-20001. [AP-2152, AP-2345].
- An error is fixed in the local Web UI failed firmware notification text. [AP-2121]
- The Client Name field in the Live Status > Clients page is now limited to display 31 characters to prevent data errors in the Wireless Mode column. [AP-2210]
- The Gateway and DNS Server fields are now mandatory when you configure static IP address settings in the local Web UI. [AP-2238]
- Wireless clients can now correctly access the network after you disable NAT on an SSID configured with Network Access Enforcement and Client Isolation enabled. [AP-1814]
- Wireless clients can now correctly access the network on an SSID with VLAN and Client isolation enabled. [AP-1276]
- An access point now correctly sends a DNS request to the first listed DNS server instead of all DNS servers. [AP-2188]
- In rare cases, an access point that broadcasts many SSIDs might crash and reboot after an upgrade from firmware v2.6.7 to v2.7.6. [AP-2360]