The inetpub folder, traditionally known as the home directory for Microsoft's Internet Information Services (IIS), has recently become a center of attention due to its unexpected appearance on Windows 11 and Windows 10 systems following the April 2025 cumulative update. While many users and administrators initially puzzling over why an empty inetpub folder suddenly appeared on their C: drive, this seemingly innocuous folder is far from a benign or accidental addition. In fact, it is a deliberate component of a security strategy designed to mitigate a critical and complex vulnerability in Windows, specifically CVE-2025-21204. However, the fix has introduced a new security risk centered around how the folder can be exploited, creating a nuanced scenario of an intended safeguard becoming an exploitable weak point.
The Security Vulnerability Behind the Inetpub Folder
This story starts with a vulnerability, CVE-2025-21204, related to the improper handling of symbolic links (also known as symlinks or junction points) in the Windows Update process. Symbolic links in Windows are filesystem objects that redirect access from one file or folder to another, similar to shortcuts but at a system level. The vulnerability allowed attackers with local access to create malicious symbolic links that misdirect the Windows servicing stack during updates, potentially leading to unauthorized modification of system files or denial of service by blocking updates.
To counter this, Microsoft introduced the inetpub folder as a hardened, controlled directory at the root of the system drive (C:\inetpub). By creating and enforcing strict permissions on this folder owned by SYSTEM and TrustedInstaller accounts, Windows Update gains a trusted location to stage update files, reducing the risk that attackers can insert malicious symlinks to tamper with update operations. The folder’s mere presence, empty as it is, acts as a "safe zone" designed to disrupt the ability of malware or unauthorized users to exploit symbolic link weaknesses during updates.
Why the Inetpub Folder?
Initially, the choice of inetpub might seem odd, especially for machines not running IIS and where users may have no reason to interact with this folder. However, inetpub is historically a recognized component tied to Internet Information Services, a part of Windows web server infrastructure, making it a familiar and standardized directory to reinforce security policies around symbolic link handling. By standardizing this directory’s creation with appropriate permissions, Microsoft leverages an established system folder for its security role without adding obscure new artifacts in the filesystem.
The intent is clear: the inetpub folder is a preventive structural measure essential for mitigating symbolic link exploits that could impact update integrity and system security. Microsoft explicitly warns against deleting or tampering with this folder, as doing so could negate the benefits of the patch and leave systems vulnerable.
The Unexpected Exploit: How Inetpub Itself Can Be Hijacked
Unfortunately, this patch introduced an ironic vulnerability in itself. Security researcher Kevin Beaumont discovered that non-admin users—anyone with local access—can exploit the inetpub folder by replacing it with a directory junction (a type of symbolic link in Windows). Using a simple command, such as
mklink /J C:\inetpub C:\Windows\System32\notepad.exe
, attackers can redirect access from inetpub to a benign or unrelated file.
The Windows servicing stack runs with SYSTEM privileges and naively assumes that the C:\inetpub folder is a conventional directory it can safely write to. It does not validate whether inetpub is a directory junction or a regular folder, nor does it verify ownership or permissions tightly enough to detect manipulations. When the servicing stack attempts to stage files in inetpub, the redirection causes file operations to fail or roll back. This blocks or sabotages Windows Update processes, creating a denial of service condition whereby critical security patches cannot be applied.
Hence, this new folder, intended as a security fortress, can be turned into a Trojan horse used to undermine update reliability and security hardening.
Broader Security Implications
The inetpub folder vulnerability exemplifies a recurring pattern in Windows security: patches fixing one exploit inadvertently open new, sometimes simpler, attack vectors. This is particularly problematic because the exploit requires only local access with non-elevated privileges—no admin rights are necessary. In environments with shared computers, remote desktop access, or less controlled endpoints, this vulnerability significantly lowers the barrier for attackers to disrupt Windows updates.
Windows administrators and security professionals face the challenge of balancing sufficient privilege assignments to users without unintentionally enabling such exploit paths. The fact that basic filesystem linking commands can compromise an important OS update folder highlights ongoing architectural and permission management weaknesses.
Temporary Mitigation for the Inetpub Folder Vulnerability
Microsoft has not yet publicly released a fix to address this directory junction abuse. Meanwhile, security-conscious users and administrators can mitigate the risk by hardening the inetpub folder permissions to remove write and delete permissions for all users except SYSTEM and TrustedInstaller. This prevents unauthorized creation or alteration of junction points targeting inetpub.
The recommended steps are:
- Right-click on the inetpub folder (C:\inetpub) and select Properties.
- Go to the Security tab and click Advanced.
- Disable inheritance and remove all inherited permissions.
- Add explicit Full Control permissions for SYSTEM and NT SERVICE\TrustedInstaller only.
- Remove all other user or group permissions.
With these permissions in place, no non-system process can manipulate inetpub’s directory junctions or replace it, thwarting the attack vector demonstrated with mklink commands. The servicing stack, executing as SYSTEM, retains access and can perform updates normally.
If for any reason these hardened permissions cause update issues, users are advised to first reset Windows Update components before reverting permissions.
Restoring Inetpub If Accidentally Deleted
Some users or IT managers, suspecting the folder to be unnecessary clutter, might delete inetpub. Microsoft strongly advises against this because its removal disables critical protections against the symbolic link vulnerability. If inetpub is deleted, Windows updates could fail or the system could become exposed.
To restore inetpub, the recommended method is to enable the Internet Information Services (IIS) feature via Control Panel:
- Open Control Panel → Programs and Features → Turn Windows features on or off.
- Check "Internet Information Services" and click OK.
- This action recreates the inetpub folder with the correct permissions.
- Afterward, IIS can be disabled again without deleting the folder, retaining the security fix.
Alternatively, reinstalling the relevant Windows update or reinstalling the system patch that introduced inetpub also restores it properly.
The Lessons and Outlook for Windows Security
This inetpub episode underscores multiple enduring realities of modern Windows security management:
- Patching Complexity: Fixing underlying vulnerabilities can introduce new attack surfaces when patches involve file system structure changes and permission adjustments.
- User Communication: Users need clear, timely, and accessible technical explanations about the role of system artifacts like inetpub to avoid risky behavior like deletion.
- System Hardening: Default permissions and system processes require continuous review to close loopholes that permit local user privileges to cause disruption.
- Balance of Usability and Security: The tension between maintaining a manageable user environment and preventing misuse of features like symbolic links persists, requiring vigilant operational practices.
Until Microsoft releases an official patch revising update stack validation of symbolic links and directory junctions, administrators must apply manual defenses to protect update integrity.
Conclusion
The inetpub folder, once a humble component of Windows IIS web hosting, now plays an ironic role as both a shield and a potential point of exploitation in Windows 11’s latest security update. Its creation was a forward-looking step to curb symbolic link attacks during updates, yet the folder’s manipulability by non-admin users highlights persistent challenges in Windows’ privilege and filesystem security model.
Windows users and IT professionals should heed Microsoft’s advice: do not delete inetpub, restore it if missing, and harden its permissions to block unauthorized modifications. This approach provides vital protection until Microsoft covers this emerging vulnerability with a definitive fix.
This case study into the inetpub folder's dual role as a security feature and vulnerability reminder reveals much about the evolving cybersecurity landscape in operating systems and the intricate dance of defense, exploitation, and patching that continues to define it .
Source: Windows 11's New Inetpub Folder is Hackable. Try This Temporary Fix - Make Tech Easier