An Azure service that provides private and fully managed Remote Desktop Protocol (RDP) and Secure Shell (SSH) access to virtual machines.
Hello Cusimano, Joey,
Thanks for raising this question in Azure Q&A forum
Since Azure Bastion is a fully managed Platform-as-a-Service (PaaS), Microsoft completely manages its underlying infrastructure, including OS updates, security patches, and TLS cipher configurations. As a tenant, you do not have direct control to alter these SSL/TLS settings.
Regarding your specific findings:
ROBOT Attack: Since your own verification via Qualys SSL Labs confirms that the hosts are not vulnerable and no vulnerable TLS_RSA ciphers are active, this is undoubtedly a false positive by the scanner.
CVE-2014-8730 (TLS padding): Vulnerability scanners frequently flag any CBC ciphers as weak or vulnerable to padding oracle attacks without context. Microsoft's cloud TLS stacks have backend mitigations in place against these specific vulnerabilities, and this CVE primarily affects specific non-Microsoft technology stacks.
Your conclusion is absolutely correct. Scanners often lack visibility into platform-level mitigations and flag items based on raw cipher presence. You can safely mark these as false positives or accepted risks in your Qualys dashboard. If your compliance or security team requires formal documentation for auditing purposes, you can raise a standard Azure Support ticket to get an official statement from Microsoft confirming the mitigation.
If helps kindly accept the answer.
Best Regards,
Jerald Felix.