Introduction

Microsoft’s April 2025 cumulative update for Windows 11 introduced a subtle yet critical change that drew significant attention: the automatic creation of an empty "inetpub" folder at the root of the system drive, usually C:\, even on machines without Internet Information Services (IIS) installed or activated.

While traditionally associated with IIS—which hosts web server content—the folder’s new role transcends web service hosting and is deeply embedded in Windows security architecture as a key mitigation against a serious vulnerability known as CVE-2025-21204.


Background: From IIS to Security Sentinel

Historically, the inetpub folder has been the home directory for IIS web server files, containing scripts, logs, and site content. Its sudden presence on all Windows 11 systems, regardless of IIS use, initially confounded users and administrators alike.

Microsoft clarified this was an intentional, defense-in-depth security measure. The April 2025 update introduced this folder to combat a critical flaw involving symbolic link (symlink) exploitation in the Windows Update servicing stack. Symbolic links are special filesystem references that point to other files or directories, which, if improperly handled, can be manipulated by attackers to redirect critical system operations to unintended or malicious locations.


CVE-2025-21204: The Vulnerability at a Glance

The vulnerability CVE-2025-21204 hinges on the servicing stack’s failure to adequately verify symbolic links when staging update files. An attacker with local access could exploit these symlink resolutions to:

  • Redirect update operations to arbitrary files or folders
  • Escalate privileges
  • Sabotage Windows Update functionality

To address this, Microsoft devised a solution by introducing the inetpub folder as a hardened container with exclusive permissions granted to SYSTEM and TrustedInstaller accounts. By doing so, the servicing stack obtains a secure, trusted staging area where malicious symlink redirects are neutralized.

The inetpub folder thus acts as a "safe zone" or containment area, preventing unauthorized symbolic links from redirecting system update file operations.


Technical Details and Implications

  • The folder is:
    • Empty by design, consuming minimal disk space
    • Created in the root of the system drive on all updated Windows 11 machines
    • Owned by SYSTEM and TrustedInstaller with strict access control
  • The servicing stack trusts this folder implicitly but does not verify if "inetpub" is an actual directory or a symbolic link (reparse point), nor does it validate ownership or integrity when staging updates.

A New Attack Vector: Exploiting the inetpub Folder Itself

Security researcher Kevin Beaumont revealed a paradox where the protective inetpub folder can be exploited by local, non-administrative users. Specifically, the attacker can:

  1. Delete or rename the legitimate inetpub folder
  2. Create a directory junction (a type of symbolic link) masquerading as C:\inetpub pointing to any arbitrary file or directory, such as Notepad.exe

Example command:

CODEBLOCK0

This tricks the Windows servicing stack running under SYSTEM privileges to interact with the wrong target, resulting in:

  • Update failures or rollbacks
  • Denial-of-service (DoS) on the update mechanism

Importantly, this exploit requires no administrator privileges, making it an accessible attack vector for local users, potentially disrupting security patch delivery and exposing systems to unpatched vulnerabilities.


Practical Implications for Users and Administrators

  • Do not delete the inetpub folder. Microsoft's guidance stresses that deleting this folder undermines critical security patches associated with CVE-2025-21204.
  • If deleted, restore the folder by enabling IIS via Windows Features or reinstalling the relevant updates.
  • Mitigation pending an official fix includes hardening the inetpub folder permissions:
    • Remove inherited permissions
    • Grant Full Control only to SYSTEM and TrustedInstaller
    • Deny write and delete permissions to all other users, including local administrators

This reduces the risk of the folder being replaced with a directory junction and safeguards update operations.


Broader Security and Design Considerations

This case highlights the complexity of modern OS security where even patch mechanisms require nuanced filesystem-level controls.

  • Microsoft’s approach of using an existing, recognizable folder path as a security containment zone illustrates a security-by-design philosophy.
  • However, the introduced mitigation also surfaces new vulnerabilities, revealing the importance of holistic validation checks (e.g., verifying directory types, ownership, and reparse points) in privileged operations.
  • The ease of local user exploitation without admin rights challenges traditional assumptions about privilege boundaries on multi-user machines.

Conclusion

The inetpub folder in Windows 11's April 2025 update is much more than an empty directory; it is a strategic security component designed to protect systems from a subtle yet serious symlink vulnerability. Users and administrators must recognize its significance, avoid its removal, and apply mitigations where possible until Microsoft issues a comprehensive patch.

This update underscores the evolving nature of Windows security architecture, where the filesystem itself becomes an active participant in defending against modern exploitation techniques.