Microsoft's recent April 2025 Patch Tuesday update for Windows 11—specifically update KB5055523—introduced an unexpected yet purposeful change that has stirred curiosity and concern among users and IT professionals alike: the mysterious creation of an empty folder named
This seemingly innocuous folder is directly tied to a critical and complex vulnerability identified as CVE-2025-21204. This flaw exists in the Windows Process Activation service, a key component of the Windows Update architecture, where symbolic link (symlink) resolution was handled improperly, posing a risk of elevation of privilege attacks by local attackers. Simply put, a malicious user with physical or standard account access could exploit this vulnerability by manipulating symlinks to redirect Windows Update operations to unintended files or executables, potentially modifying or blocking critical system functions.
Microsoft's April 2025 update addresses this not by directly patching the vulnerable code outright but by preemptively creating the
When Windows Update attempts to interact with what it believes is the legitimate
This flaw forces system administrators into an uncomfortable position where they must proactively scan and identify such tampered junctions on their systems until Microsoft releases a proper fix. It underscores persistent weaknesses in Windows’ handling of symbolic links and junction points, known attack vectors that have long been a challenge for the operating system’s security model.
Microsoft had to clarify publicly that deleting this folder undermines the security patch. The folder's presence is essential for the update’s security function. Removing it re-exposes systems to the original CVE-2025-21204 vulnerability, leaving them open to privilege escalation via symlink abuse.
Restoring the folder if deleted is non-trivial for average users but straightforward for IT administrators: enabling IIS via the "Turn Windows features on or off" option in the Control Panel recreates the
Moreover, the fact that the mitigation allows non-admin users to disrupt Windows Update raises concerns about testing and validation in Microsoft’s update process. Symlinks and junctions are long-understood risks, and their handling in critical system components warrants the highest scrutiny. This incident highlights how protective patches can inadvertently introduce new attack surfaces, especially when filesystem features such as symbolic links are involved.
As Windows continues to evolve its update and security models, this incident underlines the need for transparent communication with users, robust pre-release validation of patch side effects, and ongoing vigilance by IT professionals. The
For now, all eyes are on Microsoft for their response and the forthcoming patch to fix this junction point vulnerability, while administrators must remain watchful to preserve system integrity amid these layered security maneuvers.
Source: Microsoft mystery folder fix might need a fix of its own
inetpub
on the system drive, typically C:\inetpub
. This folder traditionally belongs to Internet Information Services (IIS), Microsoft's web server platform, and is normally only created when IIS is installed and enabled. However, the new update deploys this folder on nearly all systems, regardless of IIS usage, as part of a significant security mitigation effort.
The Security Motivation Behind the Inetpub Folder
This seemingly innocuous folder is directly tied to a critical and complex vulnerability identified as CVE-2025-21204. This flaw exists in the Windows Process Activation service, a key component of the Windows Update architecture, where symbolic link (symlink) resolution was handled improperly, posing a risk of elevation of privilege attacks by local attackers. Simply put, a malicious user with physical or standard account access could exploit this vulnerability by manipulating symlinks to redirect Windows Update operations to unintended files or executables, potentially modifying or blocking critical system functions.Microsoft's April 2025 update addresses this not by directly patching the vulnerable code outright but by preemptively creating the
inetpub
folder with locked-down permissions. By doing so, the update breaks the symlink attack vector by ensuring the folder exists as intended, preventing attackers from creating malicious junction points or directory symbolic links that redirect system operations away from their expected targets. This "defensive placeholder" technique hardens Windows against the exploit, acting as a container that stops symlink misdirection toward malicious targets.The Unexpected Twist — A New Vulnerability Introduced
The fix was intended as a defensive measure, yet security researcher Kevin Beaumont uncovered that the creation of theinetpub
folder itself opened an unintended door. Beaumont demonstrated that using Windows’ mklink
command with the /j
parameter, which creates directory junctions (a type of filesystem redirect similar to symlinks), it is possible to redirect the c:\inetpub
folder to point to a critical system executable, such as c:\windows\system32\notepad.exe
.When Windows Update attempts to interact with what it believes is the legitimate
inetpub
folder, it instead gets redirected to this executable, causing the update process to error out and rollback—effectively a Denial of Service (DoS) condition. Crucially, this attack does not require administrator privileges; on many default Windows installations, even a standard user can execute this junction creation, thereby blocking security updates indefinitely without ever escalating privilege.This flaw forces system administrators into an uncomfortable position where they must proactively scan and identify such tampered junctions on their systems until Microsoft releases a proper fix. It underscores persistent weaknesses in Windows’ handling of symbolic links and junction points, known attack vectors that have long been a challenge for the operating system’s security model.
User Confusion and Risks of Deleting the Folder
Immediately after the update, users and administrators spotted theinetpub
folder and were puzzled by its presence, especially on systems without IIS enabled. The folder is empty, causing many to think it was a leftover update artifact or even a potential malware indicator. Some users deleted the folder, hoping to "clean up" their systems.Microsoft had to clarify publicly that deleting this folder undermines the security patch. The folder's presence is essential for the update’s security function. Removing it re-exposes systems to the original CVE-2025-21204 vulnerability, leaving them open to privilege escalation via symlink abuse.
Restoring the folder if deleted is non-trivial for average users but straightforward for IT administrators: enabling IIS via the "Turn Windows features on or off" option in the Control Panel recreates the
inetpub
folder with proper permissions. After this, IIS can be disabled again if not needed, but the folder must remain intact to preserve security.The Broader Context and Implications
This saga with theinetpub
folder exemplifies the complex interplay between aggressive, layered security measures and their impact on typical user and IT administration experiences. Microsoft’s approach here, rather than patching vulnerable code directly, opts for a structural defense by inserting "trap" or "anchor" folders in the file system, leveraging Windows’ known directory structures to thwart symlink manipulation. While innovative, these methods can create confusion, unexpected side effects, and new vulnerabilities.Moreover, the fact that the mitigation allows non-admin users to disrupt Windows Update raises concerns about testing and validation in Microsoft’s update process. Symlinks and junctions are long-understood risks, and their handling in critical system components warrants the highest scrutiny. This incident highlights how protective patches can inadvertently introduce new attack surfaces, especially when filesystem features such as symbolic links are involved.
Best Practices for Users and Administrators
- Do Not Delete the
inetpub
Folder: Even if it appears empty and unrelated to any active service, deleting it removes integral protection against elevation-of-privilege exploits. - Restore If Deleted: If the folder is missing, enable IIS temporarily via Windows Features to recreate it, then disable IIS to keep the protection intact.
- Scan for Junction Abuse: System administrators should scan for suspicious junction points involving
c:\inetpub
that could block Windows Updates or redirect access, especially on multi-user or shared machines. - Stay Informed and Monitor Updates: Keep abreast of official Microsoft patches and community reports to quickly respond to emerging security issues or fixes.
- Be Wary of Symlink and Junction Manipulation: This incident serves as a reminder that symbolic link and junction point handling remains a critical security consideration in Windows environments.
Conclusion
The unexpected appearance of theinetpub
folder in the April 2025 Windows update serves as a microcosm of modern operating system security challenges—balancing proactive defense mechanisms against increasingly sophisticated exploit tactics. Microsoft’s decision to tackle a subtle elevation-of-privileges bug via file system structural changes shows creative problem solving, but the resulting new risks illustrate how patching complex OS vulnerabilities demands thorough end-to-end testing.As Windows continues to evolve its update and security models, this incident underlines the need for transparent communication with users, robust pre-release validation of patch side effects, and ongoing vigilance by IT professionals. The
inetpub
folder may seem an innocuous empty directory, but in today’s cybersecurity climate, it stands at the center of a subtle yet significant battle to protect Windows devices from privilege escalation and update disruption.For now, all eyes are on Microsoft for their response and the forthcoming patch to fix this junction point vulnerability, while administrators must remain watchful to preserve system integrity amid these layered security maneuvers.
Source: Microsoft mystery folder fix might need a fix of its own