Azure Storage Account endpoints advertises TLS 1.0/1.1 and 3DES cipher — is this a vulnerability?

Gnrgy IT, Gnrgy 60 Reputation points
2025-05-15T07:38:26.7133333+00:00

I ran an sslscan against my Azure Storage Account endpoints and noticed that it advertises support for legacy protocols (TLS 1.0, TLS 1.1) and weak ciphers like TLS_RSA_WITH_3DES_EDE_CBC_SHA

However, I’ve already enforced TLS 1.2 at the storage account levelScreenshot 2025-05-15 130107

Azure Blob Storage
Azure Blob Storage
An Azure service that stores unstructured data in the cloud as blobs.
3,192 questions
{count} votes

Accepted answer
  1. Michele Ariis 1,960 Reputation points MVP
    2025-05-15T08:10:57.0933333+00:00

    Hey, seeing TLS 1.0/1.1 and 3-DES in a sslscan report on a storage account is not a vulnerability.

    Even if the TLS handshake "succeeds", Azure blocks everything at the application layer if you have set the Minimum TLS Version to 1.2 (as you already have). Clients trying TLS 1.0/1.1 get an HTTP 400 right away on the first request.

    Most scanners stop at the handshake and don't interpret the HTTP response, so they report "TLS 1.0 support" even though it's not actually usable.

    If you want to prove it to an auditor:

    curl --tls-max 1.0 https://<account>.blob.core.windows.net/ -v

    --Response: HTTP 400 - TLS version not permitted

    It's just an "optical trick" of the scanning tools. Your storage is compliant.

    1 person found this answer helpful.
    0 comments No comments

0 additional answers

Sort by: Most helpful

Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.