Thursday, April 24, 2025
HomeAzureHackers Exploit Azure App Proxy Pre-Authentication to Access Private Networks

Hackers Exploit Azure App Proxy Pre-Authentication to Access Private Networks

Published on

SIEM as a Service

Follow Us on Google News

Hackers are exploiting a vulnerability in Microsoft’s Azure App Proxy by manipulating the pre-authentication settings to gain unauthorized access to private networks.

The Azure App Proxy is designed to securely publish on-premises applications to the public internet without requiring firewall port openings, leveraging Microsoft Entra ID for authentication,.

How Azure App Proxy Works

For organizations to use Azure App Proxy, a private network connector must be installed on a system within their private network.

- Advertisement - Google News
Azure App Proxy Works
Azure App Proxy Works

This connector establishes an outbound connection to Azure, allowing applications to be published through the proxy.

According to the TrustedSec report, the pre-authentication setting is crucial here, as it determines how users are authenticated before accessing published applications.

Pre-Authentication
Pre-Authentication

Pre-Authentication Settings

Azure App Proxy offers two pre-authentication options: Microsoft Entra ID and Passthrough. 

Azure App Proxy offers two pre-authentication options
Azure App Proxy offers two pre-authentication options

Microsoft Entra ID is the default, providing robust authentication by redirecting users to Microsoft’s authentication services before accessing the application.

This ensures that all paths within the application are protected by Entra ID authentication.

On the other hand, Passthrough does not require authentication before forwarding requests to the application.

While this option might seem useful for publicly accessible applications, it leaves them vulnerable to unauthorized access.

Microsoft’s documentation warns that Passthrough does not protect against anonymous attacks, similar to exposing a server port directly to the internet.

Risks and Exploits

In a demonstration setup using a Windows Server 2022 VM hosting a basic HTTP website, two applications were configured with different pre-authentication settings:

  • MSENTRAID-redactedoutlook.msappproxy.net used Microsoft Entra ID for authentication, requiring users to authenticate before accessing the application.
  • PASSTHROUGH-redactedoutlook.msappproxy.net, as expected, did not require authentication, allowing direct access to the application and its resources.

When using the Passthrough option, not only is the intended public application accessible, but so are other resources on the server. This can lead to unintentional exposure of sensitive private network resources.

Access
Access

For instance, if a sales quoting application at the root of the site uses Entra ID for authentication, while a customer portal at a different path is intended to be publicly accessible, using Passthrough could inadvertently make the entire server accessible.

Forced Browsing and Brute-Force Attacks

Hackers can easily exploit this vulnerability by engaging in forced browsing for content discovery.

 Each request to the Passthrough URL reveals responses directly from the VM, including potentially sensitive applications or directories that were not intended to be public.

shown some errors
shown some errors

In the scenario where a path prompts for HTTP Basic authentication, attackers can use tools like Burp Suite’s Intruder to brute-force common default credentials such as admin:admin.

If weak credentials are used, unauthorized access to data or applications can occur, providing an entry point for malicious activities.

intruder attack
intruder attack

While the Azure App Proxy is a powerful tool for securing remote access to applications, misconfiguring pre-authentication settings can have severe consequences.

Organizations must carefully evaluate their use of Passthrough, ensuring that they understand the risks involved and take additional measures to secure applications and resources that are not intended for public access.

Regular security audits and strong authentication practices are crucial to mitigating these vulnerabilities and protecting sensitive private network resources.

By adopting these practices, organizations can effectively use Azure App Proxy while safeguarding their private network resources against unauthorized access.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Verizon DBIR Report: Small Businesses Identified as Key Targets in Ransomware Attacks

Verizon Business's 2025 Data Breach Investigations Report (DBIR), released on April 24, 2025, paints...

Lazarus APT Targets Organizations by Exploiting One-Day Vulnerabilities

A recent cyber espionage campaign by the notorious Lazarus Advanced Persistent Threat (APT) group,...

ToyMaker Hackers Compromise Numerous Hosts via SSH and File Transfer Tools

In a alarming cybersecurity breach uncovered by Cisco Talos in 2023, a critical infrastructure...

Threat Actors Exploiting Unsecured Kubernetes Clusters for Crypto Mining

In a startling revelation from Microsoft Threat Intelligence, threat actors are increasingly targeting unsecured...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Verizon DBIR Report: Small Businesses Identified as Key Targets in Ransomware Attacks

Verizon Business's 2025 Data Breach Investigations Report (DBIR), released on April 24, 2025, paints...

Lazarus APT Targets Organizations by Exploiting One-Day Vulnerabilities

A recent cyber espionage campaign by the notorious Lazarus Advanced Persistent Threat (APT) group,...

ToyMaker Hackers Compromise Numerous Hosts via SSH and File Transfer Tools

In a alarming cybersecurity breach uncovered by Cisco Talos in 2023, a critical infrastructure...