Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-49752: CWE-294: Authentication Bypass by Capture-replay in Microsoft Azure Bastion Developer

0
Critical
VulnerabilityCVE-2025-49752cvecve-2025-49752cwe-294
Published: Thu Nov 20 2025 (11/20/2025, 22:18:37 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Azure Bastion Developer

Description

Azure Bastion Elevation of Privilege Vulnerability

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 06:43:47 UTC

Technical Analysis

CVE-2025-49752 is a critical vulnerability in Microsoft Azure Bastion Developer that enables an authentication bypass through a capture-replay attack, categorized under CWE-294 (Improper Authentication). Azure Bastion is a managed service that provides secure and seamless RDP and SSH connectivity to virtual machines without exposing them directly to the internet. This vulnerability allows an unauthenticated attacker to intercept and replay authentication tokens or messages to gain unauthorized access to the Azure Bastion service. The attack requires no privileges and no user interaction, making it highly exploitable remotely over the network (AV:N, AC:L, PR:N, UI:N). The vulnerability impacts confidentiality and integrity severely, allowing attackers to access sensitive virtual machines and potentially escalate privileges or move laterally within the cloud environment. Availability impact is low but present due to potential disruption of service. The CVSS 3.1 vector (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:L) reflects the critical nature of this flaw, with a scope change indicating that the attacker can affect resources beyond the initially vulnerable component. No patches or mitigations have been officially released yet, and no known exploits have been observed in the wild. Given Azure Bastion's role in securing remote access, this vulnerability poses a significant risk to cloud infrastructure security.

Potential Impact

The impact of CVE-2025-49752 is severe for organizations using Azure Bastion Developer to secure remote access to virtual machines. Successful exploitation results in complete compromise of confidentiality and integrity, allowing attackers to access sensitive systems without authentication. This can lead to unauthorized data access, data exfiltration, and potential deployment of further attacks such as lateral movement, privilege escalation, or ransomware within cloud environments. Although availability impact is low, attackers could disrupt remote access services, complicating incident response and recovery. The vulnerability undermines trust in Azure Bastion's security guarantees, potentially exposing critical infrastructure, intellectual property, and customer data. Organizations relying heavily on Azure for cloud services, especially those in regulated industries or with sensitive workloads, face increased risk of data breaches and operational disruption. The lack of patches and known exploits in the wild means organizations must proactively monitor and harden their environments to mitigate risk until a fix is available.

Mitigation Recommendations

1. Immediately restrict network access to Azure Bastion Developer instances using network security groups (NSGs) or firewall rules to limit exposure to trusted IP addresses only. 2. Monitor network traffic for unusual or repeated authentication attempts that could indicate capture-replay attacks, using Azure Monitor and Azure Sentinel for anomaly detection. 3. Implement multi-factor authentication (MFA) and conditional access policies for Azure portal and management interfaces to reduce risk of compromised credentials being leveraged. 4. Isolate critical virtual machines and sensitive workloads behind additional layers of network segmentation and zero trust controls to limit lateral movement if compromise occurs. 5. Stay informed through Microsoft security advisories and apply patches or updates immediately once released. 6. Conduct regular security assessments and penetration testing focusing on Azure Bastion configurations and access controls. 7. Educate security teams about this vulnerability and prepare incident response plans specific to cloud authentication bypass scenarios. 8. Consider temporary alternative secure remote access methods if feasible until the vulnerability is patched.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
microsoft
Date Reserved
2025-06-09T22:49:37.619Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691f98772b54a79d3490b33f

Added to database: 11/20/2025, 10:38:47 PM

Last enriched: 2/27/2026, 6:43:47 AM

Last updated: 3/24/2026, 7:35:13 AM

Views: 895

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses