CVE-2025-49752

Multiple · Multiple Products

A critical vulnerability has been discovered in Azure Bastion that allows an unauthenticated remote attacker to gain administrative privileges.

Executive summary

A critical vulnerability has been discovered in Azure Bastion that allows an unauthenticated remote attacker to gain administrative privileges. Successful exploitation could lead to a complete compromise of the Bastion service and any connected virtual machines, granting the attacker full control over critical cloud infrastructure and sensitive data. Due to the critical severity (CVSS 10.0), immediate remediation is required to prevent a potential breach.

Vulnerability

This vulnerability is a critical elevation of privilege flaw within the Azure Bastion service. A remote, unauthenticated attacker can exploit this by sending a specially crafted network packet to the Bastion's public endpoint. The flaw likely resides in the pre-authentication phase of the connection handling process, allowing the attacker to bypass standard authentication and authorization checks, thereby gaining administrative-level access directly to the Bastion host or the underlying session management components. This elevated access can then be used to control any virtual machine sessions managed by the Bastion service, effectively giving the attacker privileged access into the connected virtual network.

Business impact

This vulnerability is rated as critical severity with a CVSS score of 10.0, representing the highest possible risk. A successful exploit would have a catastrophic business impact, as it would grant an attacker complete administrative control over resources managed by Azure Bastion. Potential consequences include the exfiltration of sensitive corporate data, deployment of ransomware, complete disruption of business-critical services hosted in Azure, and lateral movement across the entire cloud environment. The compromise of a secure access service like Bastion undermines the organization's security posture and could lead to significant financial loss, reputational damage, and regulatory penalties.

Remediation

Immediate Action: The primary remediation is to immediately apply the security updates provided by the vendor. Administrators should update all instances of Azure Bastion to the latest patched version to mitigate this vulnerability. Following the update, review all access logs for the Bastion service for any signs of anomalous or unauthorized access that may have occurred prior to patching.

Proactive Monitoring: Implement enhanced monitoring for the Azure Bastion service. Security teams should look for unusual connection attempts from unknown IP addresses, deviations from normal traffic patterns, and logs indicating authentication failures or errors followed by successful access. On connected virtual machines, monitor for unexpected administrative actions, new user account creation, or commands originating from Bastion sessions that are inconsistent with normal administrative activity.

Compensating Controls: If immediate patching is not feasible, apply strict Network Security Group (NSG) rules to the Azure Bastion subnet, limiting inbound access to only known, trusted corporate IP address ranges. Enable Azure Defender for Cloud and enable Just-In-Time (JIT) VM access to further restrict the window of opportunity for an attacker. These controls reduce the attack surface but should be considered temporary measures until patching is complete.

Exploitation status

Public Exploit Available: false

Analyst recommendation

This vulnerability represents a grave and immediate threat to the organization's cloud security. Due to the maximum CVSS score of 10.0, all remediation efforts must be treated with the highest priority. We strongly recommend that the immediate action plan be executed without delay to patch all affected Azure Bastion instances. Although this CVE is not currently listed on the CISA KEV list, its critical nature makes it a prime candidate for future inclusion and it should be handled with the urgency of an actively exploited threat.