• Thread Author
Here is a summary of the original Petri article on the Windows 11 'inetpub' folder security risk:

'Windows 11 'inetpub' Folder Security Flaw: Protect Your System Now'
What happened?​

  • After the April 2025 Patch Tuesday update, a new "inetpub" folder started appearing on Windows 10 and 11 machines.
  • Microsoft created this folder to help patch a bug (CVE-2025-21204) that left PCs vulnerable to certain cyberattacks.

What is the "inetpub" folder?​

  • Traditionally, "inetpub" is used by Internet Information Services (IIS) to store web content, logs, scripts, etc.
  • Even if IIS isn’t active, Microsoft now insists this folder should not be deleted for protection purposes following the latest update.

What is the new risk?​

  • Security researcher Kevin Beaumont found a new vulnerability:
  • Non-admin (regular) users can create a “junction point” in the C:\ directory—a type of directory symbolic link—where inetpub would otherwise go.
  • This prevents the system from actually creating the real "inetpub" folder.
  • The result: All future Windows security updates can be blocked.
  • PCs could be left exposed to threats fixed by those updates.
  • This blockage produces error messages and failed update rollbacks.
  • No admin rights are required—making it easier for attackers or mischievous users to exploit on shared devices.

Is Microsoft fixing it?​

  • The researcher disclosed this issue to Microsoft, but as of writing, Microsoft has not publicly responded.

Summary​

  • The well-intentioned fix created a significant new attack vector.
  • Regular users could prevent critical updates and expose Windows systems to new security risks—even without special privileges.
Sources:
Full Petri Article

Source: Petri IT Knowledgebase https://petri.com/windows-11-inetpu...9AF6BAgFEAI&usg=AOvVaw2ig-_zB-aKuicALA4fUPGU/
 

Last edited:
The recent emergence of the inetpub folder on Windows 11 systems, starting with the April 2025 cumulative update, has stirred considerable discussion and concern within the Windows user and administrator communities. This seemingly innocuous empty directory—traditionally associated with the Internet Information Services (IIS) web server—has surprisingly become a focal point for both security strategy and vulnerability, revealing deep insights into the current state and future direction of Windows system security.

A futuristic computer screen displays multiple transparent data windows floating in a dimly lit room.
Understanding the Inetpub Folder’s New Role​

The inetpub folder’s presence on virtually every Windows 11 PC following the April 2025 update (notably KB5055523) is neither accidental nor a bug. Microsoft has confirmed that this folder is intentionally created as part of a critical security patch addressing vulnerability CVE-2025-21204. This vulnerability involves improper handling of symbolic links (symlinks) within the Windows Update stack, which, if exploited, could allow local attackers to manipulate or redirect system file operations, potentially causing unauthorized elevation of privileges or compromising update integrity.
The folder essentially serves as a hardened container or controlled "safe zone" where Windows can safely stage update files and verify symbolic link operations with a trusted system-level permission context. Even though IIS itself might not be active, and the folder remains empty, inetpub acts as a protective measure preventing attackers from exploiting missing directories or symlink manipulations during update operations.
Traditionally, inetpub hosts web server files and IIS-related resources. In this new security capacity, it serves as a strategic anchor point with strict system permissions, ensuring that the Windows Servicing Stack, which runs with SYSTEM privileges, does not unknowingly follow malicious reparse points or junctions that could redirect update files to unintended locations. This novel use of an established IIS directory name leverages the operating system’s existing security architecture for a new defensive purpose .

The Vulnerability and How It’s Exploited​

The core vulnerability arises from the servicing stack's failure to differentiate between genuine directories and directory junctions (a type of reparse point that can redirect file system operations). Security researcher Kevin Beaumont demonstrated that any local user, without requiring administrator privileges, can replace the inetpub folder with a directory junction to any file—such as Notepad.exe. This redirect causes Windows Update operations to fail, either by blocking updates or triggering rollbacks.
In practical terms, an attacker with basic access to the PC could circumvent the patch protections by exploiting the inetpub folder’s symbolic link handling. This leads to denial-of-service conditions regarding Windows Update, effectively preventing new updates from being applied and leaving the system vulnerable to other exploits or malware. The simplicity of this exploit is concerning: it requires no elevated privileges and leverages built-in Windows command tools like mklink /J to perform the redirection. Such a low barrier increases the risk, especially in environments with multiple users or where devices might be physically accessible to others .

Microsoft’s Current Response and User Mitigation​

As of now, Microsoft has not publicly released an official fix or patch directly addressing this secondary vulnerability arising from the new inetpub folder deployment. However, users and IT administrators have devised temporary but effective mitigation strategies.
A recommended workaround involves modifying the security permissions on the inetpub folder to remove write and delete rights for all user accounts except for SYSTEM and TrustedInstaller. By restricting folder permissions in this manner, even local users with non-admin privileges cannot replace the inetpub folder with a directory junction, thus blocking the exploit pathway. The update and servicing processes maintain full access to the directory, ensuring updates can continue normally.
This permission adjustment can be achieved by:
  • Accessing the folder properties in File Explorer,
  • Navigating to the Security tab,
  • Disabling inheritance to remove inherited permissions,
  • Assigning Full Control only to SYSTEM and TrustedInstaller,
  • Removing all other user permissions.
Users and administrators must be cautious with this action, as overly restrictive or incorrect permissions could interfere with update processes. If Windows Update errors occur following permission changes, resetting Windows Update components is advised before rolling back permission changes. Importantly, this solution is a temporary safeguard pending further patches from Microsoft .

Risks of Deleting the Inetpub Folder​

There has been some confusion and temptation among users to delete the inetpub folder given that it appears empty and unused by the average consumer. Microsoft strongly advises against deleting the folder, as its removal disables the security patch's protective mechanisms. Without the inetpub folder, the symbolic link vulnerability resurfaces, potentially exposing the device to local exploits and privilege escalations.
If users or administrators delete the inetpub folder, restoring it is critical. The recommended approach is to:
  • Enable Internet Information Services (IIS) via the "Turn Windows features on or off" option in Control Panel,
  • This action recreates the inetpub folder with the appropriate system permissions,
  • Users can then disable IIS if not needed, leaving the folder intact,
  • Alternatively, uninstalling and reinstalling the relevant Windows update will restore the folder.
Manual recreation of the folder and its permissions is possible but not recommended for most users due to the complexity and potential for misconfiguration. This recovery process underscores the importance of understanding that folders seemingly unrelated to daily use may hold critical security functions and should not be casually removed .

Broader Lessons and Implications for Windows Security​

This inetpub folder episode highlights multiple key themes in modern operating system security and update management:
  • Security via System Structure: Microsoft’s approach shows an evolution from patching code flaws alone toward embedding structural safeguards in the OS file system and permission architecture. Creating decoy or controlled directories is a proactive barrier against exploitation that cleverly repurposes known system elements.
  • The Challenge of Transparency: Users and IT professionals often face opaque updates that alter system behavior in non-obvious ways. The inetpub folder’s mysterious appearance caused understandable confusion, illustrating how critical clear update documentation and communication are to maintaining trust and preventing harmful user actions like deletion or permission changes that could destabilize systems.
  • Fragility and Complexity of Cumulative Updates: Features introduced as mitigations can themselves harbor vulnerabilities or operational risks, requiring layered fixes and community vigilance. The inetpub vulnerability is a low-privilege local exploit but demonstrates that security solutions need continual reassessment to avoid turning into new attack vectors.
  • The Need for User and Administrator Vigilance: Especially on multi-user or shared machines, even basic local access can be leveraged dangerously. Sound security policies include restricting user permissions carefully, staying informed about update impacts, and resisting the urge to "tidy up" system drives without validating changes.
  • Windows Update as a Prime Attack Surface: The servicing stack operates with highest privileges and is thus a frequent target. Ensuring that its environment is tightly controlled and resilient to redirections is vital for maintaining system integrity.
Through this lens, the inetpub folder not only functions as a guardian in disguise but also an emblem of the ongoing tug-of-war between ease of use, security, and system complexity in modern Windows environments .

Conclusion​

The inetpub folder is far more than an empty directory or leftover artifact of internet hosting services. Introduced deliberately as a part of a critical Windows security update, it plays an essential role in protecting systems from symbolic link exploitation that could compromise Windows Update functionality and system integrity.
However, the folder’s deployment has also revealed new vulnerabilities—allowing non-admin users to hijack the folder via directory junctions, leading to update failures and potential security gaps. Until Microsoft patches this secondary vulnerability, users can safeguard their systems by adjusting folder permissions to restrict access to SYSTEM and TrustedInstaller only.
Furthermore, users must avoid deleting the inetpub folder, and if removed accidentally, promptly restore it via enabling IIS or reinstalling the update, thereby ensuring their system remains protected.
This episode serves as a cautionary tale about the intricacies of modern OS security management, the importance of transparent communications by vendors, and the ongoing vigilance required by users and administrators alike to maintain robust defenses in an evolving threat landscape. The inetpub folder is a quiet sentinel—empty yet essential—shielding the Windows ecosystem’s update processes from subtle but dangerous exploit attempts.
For Windows enthusiasts, IT admins, and security professionals, understanding and respecting these hidden defense layers is critical. While it may seem counterintuitive to accept an empty folder as a cornerstone of security, the inetpub saga underscores that in the complex world of cybersecurity, appearances can be deceiving.

If you want to ensure safe handling of the inetpub folder or learn how to adjust permissions correctly, consult Microsoft’s official documentation or trusted Windows community resources. Stay informed and cautious to maintain a secure and smoothly updating Windows environment .

Source: Windows 11's New Inetpub Folder is Hackable. Try This Temporary Fix - Make Tech Easier
 

The recent emergence of the "inetpub" folder on Windows 11 systems, following the April 2025 cumulative updates, has caused considerable discussion and concern among users and IT professionals alike. Traditionally, this folder is known as the default root directory for Microsoft's Internet Information Services (IIS), used for hosting websites and web applications. However, with recent updates, an empty "inetpub" folder now appears on practically every Windows 11 system, regardless of whether IIS is installed or active. This development is not a glitch or overlooked residue but a calculated security feature introduced by Microsoft as part of addressing a critical vulnerability, CVE-2025-21204.

A digital interface with interconnected icons and warning symbols overlays an abstract blue 3D background.
The Security Patch and the Role of the Inetpub Folder​

CVE-2025-21204 refers to a vulnerability discovered in the Windows Update servicing stack. The flaw specifically involved improper handling of symbolic links (also known as symlinks or junction points), which are filesystem shortcuts that point to other files or directories. Prior to the patch, attackers with local access could exploit symbolic link mishandling to trick Windows into modifying or accessing files it was not supposed to, potentially escalating privileges or corrupting critical system files.
To mitigate this risk, Microsoft implemented a preventive structural measure: the automatic creation of the "inetpub" folder on the system drive as a controlled environment with strict permissions. This folder acts as a trusted directory, designed to prevent any malicious redirection through symbolic links during Windows Update operations. By ensuring the folder exists with correct security settings, Windows can securely stage update files without falling prey to symbolic link manipulation.
Despite this purposeful installation, the folder itself remains empty and does not indicate IIS is running or enabled on the system. It occupies negligible disk space and is largely invisible to end users in normal system activities. Microsoft has explicitly warned users not to delete this folder, as doing so undermines the effectiveness of the security patch, leaving systems vulnerable to the very exploits the patch was designed to prevent.

The Exploitability and Ease of Attack​

While the introduction of this folder was meant to plug a major security hole, unintended consequences have surfaced that pose a novel risk. Security researcher Kevin Beaumont has revealed that any local user on the system, including non-admin accounts, can exploit the "inetpub" folder’s existence by replacing it with a directory junction to an arbitrary target, such as a system file like Notepad.exe.
This is achieved by a simple command executed in the command prompt without administrative privileges:
mklink /J C:\inetpub C:\Windows\System32\notepad.exe
This command deletes the original "inetpub" folder and creates a junction point (a type of symbolic link) pointing to another file. Since the Windows servicing stack runs as SYSTEM and trusts the "inetpub" directory, it will mistakenly follow this junction and attempt to stage update files in the wrong location. This redirection causes Windows Update operations to fail or roll back, effectively blocking system updates and opening the door for patch sabotage.
The implication here is profound: the basic security patch relies on a folder that local non-elevated users can manipulate to disrupt the update process. While this requires physical or local access and is not a remote exploit, it represents a glaring vulnerability in Windows update infrastructure that can be leveraged by malicious insiders or malware operating with standard user privileges.

Mitigating the Vulnerability: Practical Steps Until a Microsoft Fix​

As of now, Microsoft has remained notably silent on the vulnerability, and no official fix or update addressing this exploitation vector has been announced. In the meantime, users and system administrators can adopt defensive measures to protect their systems.
The core principle to prevent exploitation is to restrict write and delete permissions on the "inetpub" folder for all users except the SYSTEM and TrustedInstaller accounts. This approach ensures that only trusted system processes can modify or remove the folder, effectively blocking non-admin users from replacing it with a malicious junction.
Here is a stepwise guide to apply this mitigation:
  • Navigate to the root of the system drive (usually C:), right-click the "inetpub" folder and select Properties.
  • Go to the Security tab and click the Advanced button.
  • In the advanced security settings, click Disable inheritance and then choose Remove all inherited permissions.
  • Click Add, then Select a principal, and enter SYSTEM. Confirm and assign Full control permissions.
  • Repeat the previous step for the NT SERVICE\TrustedInstaller account.
  • Apply and save all changes.
After this, the folder is only editable by core system components, and any attempt by a user or process without proper permissions to modify or delete the folder will be blocked with a permission denied error.
In environments where this mitigation is applied, Windows Update should continue functioning normally, and the risk posed by the current vulnerability is minimized. Should this solution need to be reversed, users can re-enable permission inheritance through similar steps to restore default access.

The Broader Context: A Symptom of System Complexity and Security Trade-offs​

This incident reflects a recurring theme in Windows security management: the complexity of balancing usability, backward compatibility, and layered defense mechanisms sometimes leads to imperfect fixes or new attack surfaces. The "inetpub" folder's introduction was a clever workaround for a tricky vulnerability, yet the patch's implementation inadvertently opened a related weakness due to insufficient checks in the servicing stack around symbolic link validation and folder permissions.
Moreover, the exploitability by non-admin users is concerning given the rise of shared desktops, multi-user workstations, and the increasing intermixing of personal and corporate usage. Even with physical security measures in place, this kind of vulnerability lowers the barrier for an insider threat or a compromised standard user account to hinder updates, potentially preventing critical patches from installing.
While not trivial to exploit in remote attack scenarios, the existence of such an easily triggered weakness emphasizes the need for vigilant system administration practices and for Microsoft to address these foundational issues in future servicing stack improvements.

Restoring Deleted Inetpub Folder: What If You Remove It?​

Some users have attempted to delete the mysterious "inetpub" folder out of curiosity or in a mistaken effort to clean up their system drives. Microsoft strongly advises against this, as the folder’s absence breaks the security patch's functionality.
If deleted, users can restore the folder by:
  • Opening Control PanelPrograms and Features.
  • Clicking Turn Windows features on or off.
  • Temporarily enabling Internet Information Services (IIS), which recreates the "inetpub" folder with appropriate permissions.
  • Disabling IIS afterward if desired.
Alternatively, reinstalling the relevant Windows update or waiting for the next cumulative update typically restores the folder correctly.

Conclusion: A Guardian Folder with a Catch​

The "inetpub" folder on Windows 11 systems epitomizes a modern cybersecurity challenge—sometimes, protective measures introduce new complexities and risks that demand ongoing vigilance. This empty folder is no benign artifact; it is a silent guardian designed to harden the system against a significant symbolic link exploit. Yet, its current implementation opens a straightforward avenue for local users to undermine Windows update mechanisms.
Until Microsoft issues a robust fix, IT professionals and users should proactively harden permissions on the folder to halt exploitation. At the same time, this episode serves as a reminder that even empty folders can carry tremendous importance in the security fabric of modern operating systems. Awareness, cautious system management, and staying abreast of updates remain critical to maintaining Windows system integrity.
By respecting the "inetpub" folder and implementing the appropriate mitigations, users help ensure their PCs remain secure and fully patched, even amid the complex trade-offs sometimes unavoidable in operating system security.


Source: Windows 11's New Inetpub Folder is Hackable. Try This Temporary Fix - Make Tech Easier
 

The recent appearance of the "inetpub" folder on Windows 11 systems, particularly after the April 2025 cumulative update, marks a significant yet somewhat perplexing development in Microsoft's ongoing efforts to bolster Windows security. While the folder's sudden emergence on virtually all updated computers has caused confusion among users and IT professionals alike, its presence is far from arbitrary. Instead, it embodies a strategic, albeit imperfect, response to a complex security vulnerability rooted in symbolic link exploitation. Understanding the implications of this folder’s creation, the security concerns it addresses and inadvertently introduces, and practical mitigation steps is vital for Windows enthusiasts and system administrators committed to maintaining robust system integrity.

A glowing folder with a lock symbol represents secure data protection in a connected digital network.
The Origin and Purpose of the Inetpub Folder in Windows Updates​

Traditionally, the inetpub folder is associated with Microsoft’s Internet Information Services (IIS) web server—a component installed predominantly on servers and development machines to host web applications and websites. On typical consumer or business machines without IIS enabled, "inetpub" would not be present. The April 2025 Windows 11 update (specifically KB5055523) changed this norm by introducing an empty "inetpub" folder on the system drive (C:).
Microsoft confirmed this was intentional and tied to a critical security patch aimed at addressing vulnerability CVE-2025-21204. This vulnerability involved improper handling of symbolic links (or symlinks) in the Windows Update stack, which potentially allowed local attackers to redirect system file operations maliciously. Symbolic links are filesystem objects that point to other files or directories, serving as shortcuts. Mishandling these links could enable attackers to inject malicious redirections, ultimately compromising system integrity by elevating privileges or manipulating critical files.
Creating the inetpub folder with locked-down system-level permissions acts as a controlled container to mitigate this risk. By establishing a trusted directory that Windows Update can reliably reference, the system limits symbolic link exploitations in update operations. Essentially, inetpub serves as a "decoy" or hardened staging ground where symlink redirection attacks are neutralized, helping ensure the integrity of update deployment and safeguarding critical system components.

The Security Vulnerability and Its Exploitability​

Despite this protective intent, researchers like Kevin Beaumont uncovered an ironic flaw: any local user, including non-administrators, can manipulate the newly created inetpub folder by replacing it with a directory junction (a type of symlink in Windows). Using a simple command such as:
mklink /J C:\inetpub C:\Windows\System32\notepad.exe
an attacker fragments the trust Windows places in inetpub. By redirecting inetpub access to a file like Notepad instead of a secure directory, Windows Update becomes confused or blocked when it tries to stage files, causing update failures or rollbacks. The servicing stack runs as SYSTEM and treats inetpub as a trusted path but does not verify if it is a junction or who owns it; this lack of validation creates a loophole.
This exploitability represents a peculiar paradox wherein the security measure meant to protect Windows Update inadvertently opens a new attack vector—a local denial of service against updates. Since the exploit requires only standard user privileges, it is particularly worrying in multi-user or shared machine environments where malicious local access could be achieved with relative ease.

Practical Impact and Warning: Why You Should Not Delete Inetpub​

Given its origins, the inetpub folder is essential for the ongoing integrity of Windows Update operations and system security. Deleting this folder, despite its emptiness and apparent lack of active use, disables critical protections tied to the associated patch. Microsoft has strongly advised users not to remove or modify this folder. Removing inetpub could effectively "undo" the security fixes associated with CVE-2025-21204, exposing systems to symbolic link exploitation and privilege escalation threats.
For users who have deleted the folder—often tripped by system cleanup urges or misunderstanding its purpose—Microsoft recommends restoring it by enabling IIS through the "Turn Windows features on or off" interface. Enabling IIS recreates the inetpub folder with the correct security permissions. This workaround reinstates the folder's protective functions without requiring full IIS activation. Alternatively, reinstalling the relevant Windows security updates can also restore the folder correctly.

Temporary Mitigation: Locking Down the Inetpub Folder​

Until Microsoft issues a dedicated fix to prevent directory junction exploitation of inetpub, users and administrators can manually harden the folder’s permissions to prevent unauthorized junction creation. The critical approach is to strip all user write or delete permissions from the inetpub folder, while retaining full control for SYSTEM and TrustedInstaller accounts. This change stops non-system processes—including non-admin users—from replacing the inetpub folder with malicious junctions.
The steps are straightforward:
  • Right-click on C:\inetpub and open Properties.
  • Navigate to the Security tab and click Advanced.
  • Disable inheritance, opting to remove all inherited permissions.
  • Add explicit permissions granting Full Control only to SYSTEM and NT SERVICE\TrustedInstaller.
  • Apply changes and exit.
This locks the folder so that only essential Windows update processes can access or modify it safely. Attempts by other users to alter inetpub result in permission denied errors, thwarting the directory junction exploit temporarily.

The Bigger Picture: What This Reveals About Windows Security​

This inetpub folder saga exposes larger truths about Microsoft's security approach and Windows update complexities. Rather than directly fixing the symbolic link vulnerability by changing how Windows validates and resolves symlinks, Microsoft created a structural workaround involving the inetpub folder. This solution reclaimed a historical IIS folder as a protective container, embedding new security rules around it.
While this reflects conceptual creativity, the vulnerability to directory junction replacement underscores a reactive, patchwork quality in Windows security design. The problem—a privileged system process trusting a folder without verifying its true nature—illustrates systemic challenges in balancing legacy filesystem behaviors, backward compatibility, and modern security needs.
The fact that relatively unsophisticated local users can subvert such a key patch indicates a need for more robust validation of system folders and symbolic link handling, especially in security-critical contexts like Windows updates. Moreover, Microsoft's silence or slow response to this discovery has left users and administrators caught between applying essential security fixes and managing new weak points the fixes create.

Summary and Best Practices for Users and IT Administrators​

  • Do Not Delete the inetpub Folder: Even if it appears empty and unused, this folder is integral to the latest Windows security patch protecting against symbolic link exploits.
  • Restore inetpub If Deleted: Enable IIS in Windows Features to regenerate the folder correctly, or reinstall the relevant Windows update to restore secure permissions and defenses.
  • Lock Down Permissions on inetpub: To prevent malicious local users from replacing the folder with harmful junctions, remove write and delete permissions from all users except SYSTEM and TrustedInstaller.
  • Stay Updated and Informed: Follow official Microsoft advisories and trusted third-party security analyses to keep abreast of any forthcoming patches addressing this issue more holistically.
  • Exercise Caution on Multi-User Systems: Since non-admin users can exploit this vulnerability, systems in shared or untrusted environments should adopt stricter user access controls.
The inetpub folder vulnerability represents an intricate example of how modern cybersecurity depends on a delicate interplay of system architecture, user privileges, and update strategies. While imperfect, the folder’s existence and associated workarounds are currently necessary to guard against a deeper symbolic link exploit. Windows users and IT professionals alike should heed the guidance to maintain this folder’s presence and secure its permissions, ensuring their systems remain resilient until Microsoft delivers a comprehensive solution.

This comprehensive look at the inetpub folder issue blends technical detail with practical advice, revealing the unfolding narrative of Windows update security in 2025. It illuminates both the promise and peril of Microsoft’s evolving patchwork defense strategies designed to safeguard millions of devices worldwide against increasingly subtle attacks.

References:
  • Kevin Beaumont’s research and public disclosure on the inetpub folder vulnerability.
  • Microsoft’s official advisory on inetpub's role in the CVE-2025-21204 patch.
  • Detailed user and expert discussions on locking down inetpub permissions as a mitigation.
  • Community and security forums highlighting the nature and impact of symbolic link exploitation in Windows updates.
For further reading and detailed step-by-step mitigation instructions, users can refer to MakeTechEasier’s coverage on the Windows inetpub folder vulnerability and related Windows community discussions.

Source: Windows 11's New Inetpub Folder is Hackable. Try This Temporary Fix - Make Tech Easier
 

Back
Top