Summary : Critical vulnerability CVE-2025-49752 in Azure Bastion, could allow remote privilege escalation, directly impacting the security of cloud infrastructure for organizations worldwide.
| OEM | Microsoft |
| Severity | Critical |
| CVSS Score | 10.0 |
| CVEs | CVE-2025-49752 |
| POC Available | No |
| Actively Exploited | No |
| Exploited in Wild | No |
| Advisory Version | 1.0 |
Overview
The vulnerability in Azure Bastion allows attackers to gain administrative access with a single network request and remote privilege escalation, resulting in full compromise of virtual machines connected through the Bastion host.
Azure Bastion is managed service that provides secure RDP and SSH access to virtual machines without exposing them to the public internet. While no active exploitation has been confirmed, administrators are urged to update the latest Microsoft security patch in the systems.
| Vulnerability Name | CVE ID | Product Affected | Severity | Fixed Version |
| Azure Bastion Elevation of Privilege Vulnerability | CVE-2025-49752 | Microsoft Azure Bastion | Critical | Security Update Released Nov 20, 2025 |
Technical Summary
The vulnerability in Azure Bastion’s login process allows attackers to reuse stolen authentication tokens to get in without valid login credentials. This way they can bypass normal security checks and gain admin-level access and perform administrator activities.
The attack can be carried out remotely over the network without needing any user interaction. After successful login, the attacker can fully control virtual machines connected through the Bastion service. This results in a complete takeover risk for cloud systems using Azure Bastion as per According to zeropath, the vulnerability stems from improper handling of authentication tokens within the Bastion service.
| CVE ID | System Affected | Vulnerability Details | Impact |
| CVE-2025- 49752 | All Azure Bastion deployments prior to Nov 20, 2025 | Authentication bypass via token replay enabling remote escalation to admin privileges | Full administrative VM access, Configuration modification, Unauthorized remote entry, Cloud workload compromise, Lateral movement. |
Attackers Can Escalate Privileges Without User Interaction, for quick remediation follow below inputs
Here are some recommendations below
Conclusion:
This critical authentication bypass vulnerability exposes Azure Bastion deployments to severe risk, enabling remote administrative takeover without authentication or user interaction.
Organizations relying on Azure Bastion for secure cloud access must prioritize patching, log auditing, credential review and network control enforcement. Organizations should quickly check their Azure Bastion setups and make sure all security patches are installed.
Microsoft maintains a monthly patch cycle and has launched the Secure Future Initiative to improve security development. Despite these efforts, recurring authentication and privilege escalation issues have been observed across Azure services.
References:
Recent Comments