The recent emergence of the "inetpub" folder in Windows 11 systems has stirred a mix of curiosity and concern among users and IT professionals alike. Introduced as part of Microsoft's April 2025 cumulative update, this seemingly innocuous, empty directory located at the root of the system drive (usually C:\inetpub) is more than just a leftover or a redundant folder—it plays a critical role in patching a significant security vulnerability known as CVE-2025-21204.
Traditionally, inetpub is associated with Microsoft's Internet Information Services (IIS), where it serves as the default directory for hosting websites and web applications. For most consumer users, particularly those who do not run IIS, the sudden presence of this folder has come as a surprise. Despite being empty and occupying negligible disk space, Microsoft's introduction of inetpub with the April 2025 update is a deliberate protective measure integrated into the Windows servicing infrastructure.
The CVE-2025-21204 vulnerability relates to improper handling of symbolic links (symlinks) within the Windows Update stack. Symlinks are filesystem shortcuts that can redirect operations from one file or directory to another. Improper resolution of these links can allow local attackers to manipulate system files or escalate privileges by redirecting update operations to malicious targets.
To combat this, Microsoft created a hardened and trusted folder—inetpub—on every system, ensuring that the servicing stack, running with SYSTEM privileges, has a safe, controlled directory to interact with when staging files during updates. By securing this directory and granting it strict permissions, Microsoft aimed to close the gap that attackers previously exploited through missing or improperly secured directories.
Security researcher Kevin Beaumont uncovered that any non-admin user with local access can exploit this by replacing the inetpub folder with a directory junction via a simple command like:
This command creates a junction pointing inetpub to a system file (e.g., Notepad.exe). When Windows Update later tries to write to inetpub, it is misdirected to this file path, causing update failures or rollbacks.
Because the servicing stack runs as SYSTEM and implicitly trusts C:\inetpub, it does not check the ownership or type of this directory, enabling local users—even without admin privileges—to cause Windows Update attempts to fail. This results in a denial-of-service-type vulnerability where security patches cannot be applied until the situation is corrected.
From an administrative perspective, the core risk is not immediate remote exploitation but the local user's ability to halt critical system updates without requiring admin rights. Environments with many shared or multi-user Windows machines—including enterprises, public labs, and educational institutions—must be aware of this attack surface.
Yet, this also highlights the challenges in patch design where an update must balance protecting critical system operations while limiting potential new attack vectors—particularly from low-privilege, local users. The design oversight in ignoring directory junction validations during servicing stack operations is a stark reminder of the delicate and sometimes paradoxical nature of security engineering.
For IT teams and individual users, cautious management of system updates and ongoing vigilance through monitoring folder permissions and unexpected symbolic links can prevent exploitation of such vulnerabilities while awaiting a formal Microsoft fix.
Until an official patch arrives, manual tightening of folder permissions offers a practical defense. Users should keep the inetpub folder intact and maintain regular update cycles, bearing in mind the increasingly sophisticated and sometimes subtle nature of Windows security measures.
In the evolving landscape of OS security, even an empty directory can wield considerable influence over your system’s resilience, underscoring the need for informed stewardship of updates and system assets.
This analysis draws extensively on findings documented by security researcher Kevin Beaumont and a range of technical discussions throughout Windows enthusiast communities, alongside Microsoft’s official guidance on the inetpub folder’s purpose and handling .
Source: Windows 11's New Inetpub Folder is Hackable. Try This Temporary Fix - Make Tech Easier
The Security Context of inetpub
Traditionally, inetpub is associated with Microsoft's Internet Information Services (IIS), where it serves as the default directory for hosting websites and web applications. For most consumer users, particularly those who do not run IIS, the sudden presence of this folder has come as a surprise. Despite being empty and occupying negligible disk space, Microsoft's introduction of inetpub with the April 2025 update is a deliberate protective measure integrated into the Windows servicing infrastructure.The CVE-2025-21204 vulnerability relates to improper handling of symbolic links (symlinks) within the Windows Update stack. Symlinks are filesystem shortcuts that can redirect operations from one file or directory to another. Improper resolution of these links can allow local attackers to manipulate system files or escalate privileges by redirecting update operations to malicious targets.
To combat this, Microsoft created a hardened and trusted folder—inetpub—on every system, ensuring that the servicing stack, running with SYSTEM privileges, has a safe, controlled directory to interact with when staging files during updates. By securing this directory and granting it strict permissions, Microsoft aimed to close the gap that attackers previously exploited through missing or improperly secured directories.
How the inetpub Folder Becomes a Vulnerability
Ironically, the security fix itself introduces a new vulnerability stemming from how Windows treats the inetpub directory. The servicing stack treats the inetpub folder as trusted but fails to validate whether it is a regular folder or has been replaced or redirected by a directory junction (a type of symbolic link in Windows).Security researcher Kevin Beaumont uncovered that any non-admin user with local access can exploit this by replacing the inetpub folder with a directory junction via a simple command like:
mklink /J C:\inetpub C:\Windows\System32\notepad.exe
This command creates a junction pointing inetpub to a system file (e.g., Notepad.exe). When Windows Update later tries to write to inetpub, it is misdirected to this file path, causing update failures or rollbacks.
Because the servicing stack runs as SYSTEM and implicitly trusts C:\inetpub, it does not check the ownership or type of this directory, enabling local users—even without admin privileges—to cause Windows Update attempts to fail. This results in a denial-of-service-type vulnerability where security patches cannot be applied until the situation is corrected.
Implications for Users and System Security
This vulnerability represents a peculiar and troubling dynamic where the fix for one vulnerability (CVE-2025-21204) inadvertently opens the door for another attack vector: easy sabotage of Windows Update by low-privilege users. The impact is particularly serious for organizations relying on timely security patches to maintain compliance and defend against malware.From an administrative perspective, the core risk is not immediate remote exploitation but the local user's ability to halt critical system updates without requiring admin rights. Environments with many shared or multi-user Windows machines—including enterprises, public labs, and educational institutions—must be aware of this attack surface.
Mitigating the Vulnerability
At the time of discovery, Microsoft has not provided a dedicated patch or official fix beyond the existing update. In the interim, security professionals and power users can manually modify the permissions on the inetpub folder to mitigate the risk:- Restrict Write and Delete Permissions: Remove write and delete permissions for all non-system user accounts on the inetpub folder.
- Allow Only SYSTEM and TrustedInstaller Full Control: Grant full control permissions solely to the SYSTEM account and NT SERVICE\TrustedInstaller.
- Disable Inheritance: Disable permission inheritance on the folder and remove all inherited permissions to ensure only explicitly allowed accounts have access.
Correct Handling of inetpub
In addition to restricting permissions, users are strongly advised:- Not to delete the inetpub folder, as its presence is essential for the security patch to work correctly.
- If the folder has been deleted, restore it by temporarily enabling IIS through the Control Panel's "Turn Windows features on or off" dialog. This process recreates the folder with proper permissions.
- Alternatively, uninstalling and reinstalling the relevant April 2025 update achieves the same restoration.
Broader Lessons and Context
The inetpub case exemplifies an ongoing pattern in Windows security updates: patches often introduce complex, under-the-hood changes that are pivotal for security but may appear puzzling or useless at first glance. Empty folders like inetpub, or subtle permission modifications, serve as silent sentinels guarding Windows's integrity.Yet, this also highlights the challenges in patch design where an update must balance protecting critical system operations while limiting potential new attack vectors—particularly from low-privilege, local users. The design oversight in ignoring directory junction validations during servicing stack operations is a stark reminder of the delicate and sometimes paradoxical nature of security engineering.
For IT teams and individual users, cautious management of system updates and ongoing vigilance through monitoring folder permissions and unexpected symbolic links can prevent exploitation of such vulnerabilities while awaiting a formal Microsoft fix.
Conclusion
The unexpectedly empty inetpub folder on Windows 11 systems is no mere bystander; it is a deliberate security tool embedded within the latest updates to patch a dangerous symbolic link vulnerability. However, its role as a trusted directory introduces a novel attack vector exploitable by local users to disrupt Windows Update processes.Until an official patch arrives, manual tightening of folder permissions offers a practical defense. Users should keep the inetpub folder intact and maintain regular update cycles, bearing in mind the increasingly sophisticated and sometimes subtle nature of Windows security measures.
In the evolving landscape of OS security, even an empty directory can wield considerable influence over your system’s resilience, underscoring the need for informed stewardship of updates and system assets.
This analysis draws extensively on findings documented by security researcher Kevin Beaumont and a range of technical discussions throughout Windows enthusiast communities, alongside Microsoft’s official guidance on the inetpub folder’s purpose and handling .
Source: Windows 11's New Inetpub Folder is Hackable. Try This Temporary Fix - Make Tech Easier