#cve202521204

2025-06-09

Windows Admins—Don’t Delete That Empty inetpub Folder!

Microsoft has released a PowerShell script to restore the C:\inetpub folder created by the April 2025 security update after many users mistakenly deleted it, not realizing it plays a critical role in mitigating a high-severity privilege escalation vulnerability (CVE-2025-21204).

This seemingly empty folder helps protect against attackers escalating privileges using symbolic link abuse, and deleting it can leave your organization vulnerable. If you have already deleted it, Microsoft has a restoration script.

Read the details: bleepingcomputer.com/news/micr

#WindowsSecurity #PowerShell #CVE202521204 #PrivilegeEscalation #PatchManagement #Cybersecurity #ITAdmin #Microsoft #CISO #Infosec #IT

2025-06-06

Ever wonder how an "empty" folder could be a secret hero? Microsoft's latest update transforms the inetpub folder into a safeguard against dangerous privilege escalation attacks. Curious how this hidden defender works?

thedefendopsdiaries.com/unders

#windowssecurity
#inetpub
#cve202521204
#microsoftupdate
#cybersecurity

2025-05-01

If you have managed to delete your C:\inetpub folder following the recent #Windows security #patch for #cve202521204 then you can re-create it using the following PowerShell script:

github.com/mmotti/Reset-inetpub

This script recreates this empty folder with the correct TrustedInstaller and SYSTEM privilages.

It does nothing to prevent the creation of HardLinks to this folder of course.

You could remove the SeCreateSymbolicLinkPrivilege (via secpol.msc for example) from a user account to prohibit creation of SymLinks but you would need to check in a test envoiroment to see what effects might have that have and what might break 🤔🤷‍♂️

2025-04-11

Noticed an unexpected 'inetpub' folder on your Windows PC? Microsoft’s latest update is creating it to tackle a serious security flaw. Curious how a routine update turned into a security mystery?

thedefendopsdiaries.com/unders

#inetpub
#windowsupdate
#securityflaw
#microsoft
#cve202521204

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst