Azure front door shows weak ciphers

$@chin 200 Reputation points
2025-06-17T20:36:17.0966667+00:00

Hi ,

During the VAPT, it was observed that backend resources such as Virtual Machines, API Management, Web Apps and Function Apps are configured to use strong cipher suites. Additionally, no CBC-based cipher suites are explicitly configured.

However, tools like SSL Labs and other VAPT tools still report the presence of weak ciphers, despite Azure Front Door being configured with the TLS v1.2_2023 policy which does not include CBC based ciphers.

Ques:

  1. Is Azure Front Door still using weak cipher suites despite the configured policy ?
  2. If yes, what are the recommended steps to fully eliminate or mitigate these ciphers ?
  3. Is this a limitation or expected behavior in Azure Front Door’s design ?
  4. If it is expected, should this be considered a security concern for our application ?

traffic flow is: Client (User) → Azure Front Door → Backend (VM / APIM / Function App)

Azure Front Door
Azure Front Door
An Azure service that provides a cloud content delivery network with threat protection.
858 questions
{count} vote

Accepted answer
  1. Praveen Bandaru 5,520 Reputation points Microsoft External Staff Moderator
    2025-06-17T23:23:48.58+00:00

    Hello $@chin

    I understand you're facing an issue with Azure Front Door, particularly with the reporting of weak cipher suites during a vulnerability assessment penetration test (VAPT).

    Is Azure Front Door still using weak cipher suites despite the configured policy ?

    Yes, Azure Front Door might still be using weak cipher suites. This can happen if:

    However, the presence of weak ciphers reported may be due to client-side configurations or specific legacy protocols, rather than the Azure Front Door configuration itself.

    The client (browser or tool) connecting to Azure Front Door supports weak ciphers and negotiates to use them. The configuration of Azure Front Door is not fully aligned with the expected policies due to caching or propagation delays.

    If yes, what are the recommended steps to fully eliminate or mitigate these ciphers ?

    Make sure you are using the latest version of Azure Front Door and check your backend resources to ensure they do not support weak ciphers.
    Set up Azure Front Door with a custom TLS policy to explicitly disable any weak ciphers that might be set accidentally. Test the setup using external tools like SSL Labs to ensure it meets compliance standards.

    Is this a limitation or expected behavior in Azure Front Door’s design ?

    It is expected behavior that Azure Front Door implements strong cipher suites by default when configured. Any weak ciphers reported may be due to misconfigurations or clients that fall back on weak ciphers due to compatibility reasons. However, they also offer the ability to create custom policies for enhanced security measures.

    If it is expected, should this be considered a security concern for our application ?

    While Azure Front Door is designed to be secure with proper configuration, weak ciphers could expose your application to vulnerabilities. It's important to ensure that both Azure Front Door and your application backend are aligned in their cipher suite configurations. It is crucial to use only strong cipher suites and regularly review and update your security policies. Additionally, consider implementing security best practices such as using HSTS (HTTP Strict Transport Security) and keeping your software and dependencies up to date.

    Check the public document for more understanding:

    Azure Front Door TLS policy


    Hope the above answer helps! Please let us know do you have any further queries.

    Please do not forget to "Accept the answer” and “up-vote” wherever the information provided helps you, this can be beneficial to other community members.

    0 comments No comments

0 additional answers

Sort by: Most helpful

Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.