Azure SQL Database has a shared Control Plane due to which Azure cannot selectively turn off specific version of TLS or weak cipher suites. When Azure customers run scanners against Azure infrastructure, they will see these flagged and it is by design. Vulnerability scanners will show something like:
TLS 1.0 FOUND
TLS 1.1 FOUND
- TLS 1.2 with Weak Cipher Suite (SWEET32).
Azure initially announced deprecation of TLS < 1.2 by October 31st 2024 but Azure extended support for TLS 1.0 and TLS 1.1 to August 31, 2025 as you can read here. That should eliminate majority of the weak ciphers. Additionally, Azure is working on adding TLS 1.3 to Minimal TLS Version so customer can use it to overcome Sweet32 vulnerability but there is no official ETA.
As of today, Azure infrastructure does support TLS 1.3 connectivity even though it is not added as an option to Minimal TLS Version.
Hope this helps.