Microsoft has patched a critical authentication bypass vulnerability in its Azure Bastion service, a managed solution for secure RDP and SSH access to Azure virtual machines. The vulnerability, tracked as CVE-2025-49752, has been assigned the maximum possible CVSS score of 10.0, signifying its extreme severity. The flaw allows a remote, unauthenticated attacker to completely bypass authentication and gain administrative access to all VMs managed by a vulnerable Bastion host. The attack involves capturing and replaying authentication tokens. Microsoft has released a patch, and all Azure Bastion instances created before November 20, 2025, are considered vulnerable. Customers are strongly advised to verify their deployments are updated to prevent a potential full-scale compromise of their cloud infrastructure.
CVE-2025-49752 is an authentication bypass vulnerability stemming from a flaw in how Azure Bastion handles authentication tokens. It is classified as CWE-294 (Authentication Bypass by Capture-replay).
The attack scenario is as follows:
Because the Bastion host is a gateway to all connected virtual machines, this compromise effectively gives the attacker administrative access (RDP/SSH) to the entire fleet of VMs it manages. The attack requires no privileges and no user interaction beyond a legitimate user simply using the service.
There is currently no public evidence of this vulnerability being exploited in the wild. Microsoft discovered and patched the flaw, and the disclosure appears to be coordinated. However, given its critical nature and the simplicity of the described attack, proof-of-concept exploits are likely to be developed quickly, making immediate remediation essential.
Microsoft's advisory implies that the fix is automatically rolled out to the managed service. However, customers are urged to verify the status of their deployments. The issue highlights a potential pattern of authentication-related weaknesses in Azure services, following other critical privilege escalation flaws in Azure Networking and Azure Automation earlier in the year.
A successful exploit of CVE-2025-49752 is catastrophic for an organization using Azure Bastion. The service is designed to be a secure, hardened gateway to critical infrastructure. Its compromise completely undermines this security model.
An attacker could:
The vulnerability effectively turns a key defensive asset into a single point of failure and a primary target for attackers.
No IOCs are available as there is no known in-the-wild exploitation.
Detecting a sophisticated capture-replay attack can be challenging.
Log Analysis: Ingest Azure Bastion diagnostic logs into a Log Analytics Workspace or SIEM. Create analytics rules to look for anomalies in session establishment. For example, a single user account establishing multiple, concurrent Bastion sessions from geographically dispersed IP addresses would be highly suspicious. This is a form of D3-UGLPA: User Geolocation Logon Pattern Analysis.
Audit and Verification: The most practical detection method is to ensure the patch has been applied. Microsoft has not provided a clear method for customers to verify the patch status, but organizations should check their Azure Service Health dashboard for any notifications related to this vulnerability and open a support ticket with Microsoft if they are unsure.
Since Azure Bastion is a managed PaaS (Platform-as-a-Service) offering, the primary remediation is performed by Microsoft.
Ensure Updates are Applied: Microsoft has stated that a security patch has been released. For most customers, this patch should be applied automatically. However, it is critical to confirm this. Review the Azure Service Health dashboard and any direct communications from Microsoft.
Re-deploy Bastion Host (If Necessary): As a precautionary measure, or if advised by Microsoft, consider deleting and re-deploying your Azure Bastion host. Any new deployment created after November 20, 2025, will include the patch. This is a form of D3-PH: Platform Hardening by ensuring the latest secure version is deployed.
Review Access Logs: Proactively review all Azure Bastion access logs since its deployment for any suspicious or unexplained sessions. If any are found, assume the connected VMs have been compromised and trigger a full incident response.
Additional detection methods and remediation steps for CVE-2025-49752, including NSG flow logs and zero-trust principles.
Ensure the Microsoft-managed service has been updated. If necessary, re-deploy the Bastion host to get the latest patched version.
Mapped D3FEND Techniques:
Audit Azure Bastion diagnostic logs for anomalous session activity.
To detect the malicious replay of an authentication token as described in CVE-2025-49752, organizations must implement User Geolocation Logon Pattern Analysis. This involves streaming Azure Bastion diagnostic logs and Azure AD sign-in logs into a SIEM or Log Analytics Workspace. An analytics rule should be created to detect 'impossible travel' scenarios. For example, if a legitimate user authenticates from New York and then, seconds later, a session is initiated with a replayed token from an IP in Eastern Europe, this is a physical impossibility and a strong indicator of compromise. The rule should trigger a high-priority alert, prompting an immediate investigation and revocation of the user's active sessions. This behavioral detection is critical for catching replay attacks that might otherwise look like legitimate logins.
While Microsoft is responsible for patching the underlying service, customers can perform platform hardening to mitigate the risk and impact of such a vulnerability. The most direct action is to delete and redeploy the Azure Bastion host. Any new instance provisioned after November 20, 2025, will be based on the patched infrastructure. Additionally, organizations should follow the principle of least privilege and network segmentation. Instead of using one monolithic Bastion host to provide access to all VMs, deploy multiple, separate Bastion hosts for different virtual networks or application environments. This segmentation ensures that if one Bastion host were to be compromised, the blast radius would be contained to only the VMs in its specific segment, rather than the entire cloud estate.
Microsoft discloses CVE-2025-49752 and releases a patch for Azure Bastion.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats