{"id":37816,"date":"2025-04-23T14:18:07","date_gmt":"2025-04-23T12:18:07","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=37816"},"modified":"2025-04-24T10:48:30","modified_gmt":"2025-04-24T08:48:30","slug":"april-2025-patch-for-windows-symlink-vulnerability-cve-2025-21204-tears-new-security-issue","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2025\/04\/23\/april-2025-patch-for-windows-symlink-vulnerability-cve-2025-21204-tears-new-security-issue\/","title":{"rendered":"April 2025 patch for Windows Symlink vulnerability CVE-2025-21204 tears new security issue"},"content":{"rendered":"<p><img decoding=\"async\" style=\"margin: 0px 10px 0px 0px; display: inline; float: left;\" title=\"Windows\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2021\/04\/Windows-klein.jpg\" alt=\"Windows\" width=\"200\" align=\"left\" \/>[<a href=\"https:\/\/www.borncity.com\/blog\/2025\/04\/23\/neue-sicherheitsluecke-durch-april-2025-patch-fuer-windows-symlink-schwachstelle-cve-2025-21204\/\" target=\"_blank\" rel=\"noopener\">German<\/a>]On April 8\/9, 2025, Microsoft rolled out numerous security updates for the supported Windows versions, which were also intended to close the symlink vulnerability CVE-2025-21204. This made waves due to the Inetpub folder being patched on all Windows systems. It is now known that the security updates have opened up a new vulnerability. Every local user can permanently prevent the update installation.<\/p>\n<p><!--more--><\/p>\n<h2>April 2025 updates and the Inetpub folder<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/vg06.met.vgwort.de\/na\/d522eb4fe2bd409ebfc3bd5923124b29\" alt=\"\" width=\"1\" height=\"1\" \/>The security updates for Windows were released on April 8, 2025 (and for some Windows versions on April 9, 2025). These close various vulnerabilities (see also <a href=\"https:\/\/borncity.com\/win\/2025\/04\/09\/microsoft-security-update-summary-april-8-2025\/\">Microsoft Security Update Summary (April 8, 2025)<\/a>).<\/p>\n<p>Among other things, the Windows symlink vulnerability <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-21204\" target=\"_blank\" rel=\"noopener\">CVE-2025\u201321204<\/a> has been patched. Improper link resolution before file access (\"link following\") in the Windows Update Stack allowed an authorized attacker to escalate his rights locally, according to Microsoft. The vulnerability has been rated as \"Important\" with a CVSS 3.1 score of 7.8.<\/p>\n<p>The support article on the vulnerability <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-21204\" target=\"_blank\" rel=\"noopener\">CVE-2025\u201321204<\/a>states that a new folder <em>%systemdrive%\\inetpub<\/em> is created after installing the April 2025 update under Windows. This folder should not be deleted, regardless of whether Internet Information Services (IIS) is active on the target device, Microsoft wrote. This is because this behavior is part of the changes intended to increase the protection of Windows. No action is required from IT administrators or end users, it said. I reported on this in the blog post <a href=\"https:\/\/borncity.com\/win\/2025\/04\/11\/windows-10-11-april-2025-updates-create-inetpub-folder\/\" rel=\"bookmark\">Windows 10\/11: April 2025 updates create \"inetpub\" folder<\/a>.<\/p>\n<h2>New vulnerability created by patches?<\/h2>\n<p>The patching of the Symlink vulnerabilitye <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2025-21204\" target=\"_blank\" rel=\"noopener\">CVE-2025\u201321204<\/a> in April 2025 by Microsoft's security updates has probably backfired. Security researcher Kevin Beaumont points out in the following BlueSky post that Microsoft's fix for a Symlink vulnerability opens up another Symlink vulnerability.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/i.postimg.cc\/7YQtqMfC\/image.png\" alt=\"Kevin Beaumont about CVE-2025\u201321204 patch fail\" width=\"590\" height=\"162\" \/><\/p>\n<p>The new vulnerability allows all users (including non-administrators) to stop all future Windows security patches. Beaumont has disclosed the details in his post <a href=\"https:\/\/doublepulsar.com\/microsofts-patch-for-cve-2025-21204-symlink-vulnerability-introduces-another-symlink-vulnerability-9ea085537741\" target=\"_blank\" rel=\"noopener\">Microsoft's patch for CVE-2025\u201321204 symlink vulnerability introduces another symlink vulnerability<\/a> on DoublePulsar (Martin noticed it <a href=\"https:\/\/www.drwindows.de\/news\/inetpub-vermeintlicher-geister-ordner-unter-windows-schafft-einen-neuen-angriffspunkt\" target=\"_blank\" rel=\"noopener\">here<\/a>).<\/p>\n<p><a href=\"https:\/\/i.postimg.cc\/8cjbncLF\/image.png\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" class=\"\" src=\"https:\/\/i.postimg.cc\/8cjbncLF\/image.png\" alt=\"Symlink von inetpub auf notepad.exe\" width=\"619\" height=\"89\" \/><\/a><\/p>\n<p>Any user (administrator or standard user) can use the <em>mklink<\/em> command in a command prompt with the command:<\/p>\n<pre>mklink \/j c:\\inetpub c:\\windows\\system32\\notepad.exe<\/pre>\n<p>to create a new symlink (junction point) from the <em>%systemdrive%\\inetpu<\/em>b folder to another resource. Beaumont has demonstrated this in the screenshot above with a symlink to the Windows Editor Notepad.exe.<\/p>\n<p>If the junction point is created on <em>%systemdrive%\\inetpub<\/em>, the Windows update from April 2025 can no longer be installed, according to Beaumont. An error occurs during the update installation and\/or the installation is rolled back.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/i.postimg.cc\/TYCKPx5w\/image.png\" alt=\"Windows Update fails\" width=\"362\" height=\"219\" \/><\/p>\n<p>This update blockade will also apply to all future updates unless Microsoft makes improvements. Beaumont notified Microsoft of the problem two weeks ago, but has not yet received a response.<\/p>\n<p>Addendum: I have tested it in a VM with Windows 10 22H2. If the April 2025 security update is installed and the <strong>inetpub<\/strong> folder is present, no junction can be created.<\/p>\n<p><strong>Similar articles:<\/strong><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2025\/04\/09\/microsoft-security-update-summary-april-8-2025\/\">Microsoft Security Update Summary (April 8, 2025)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2025\/04\/09\/patchday-windows-10-11-updates-april-8-2025\/\">Patchday: Windows 10\/11 Updates (April 8, 2025)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2025\/04\/09\/patchday-windows-server-updates-8-april-2025\/\">Patchday: Windows Server-Updates (April 8, 2025)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2025\/04\/10\/patchday-microsoft-office-updates-april-8-2025\/\">Patchday: Microsoft Office Updates (April 8, 2025)<\/a><\/p>\n<p><a href=\"https:\/\/borncity.com\/win\/2025\/04\/09\/word-excel-2016-crashing-after-april-2025-update-kb5002700\/\">Word\/Excel 2016 crashing after April 2025 update KB5002700<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2025\/04\/09\/outlook-2016-calendar-access-blocked-after-april-2025-update-kb5002700\/\" rel=\"bookmark\">Outlook 2016: Calendar access blocked after April 2025 update KB5002700<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2025\/04\/11\/windows-10-11-april-2025-updates-create-inetpub-folder\/\" rel=\"bookmark\">Windows 10\/11: April 2025 updates create \"inetpub\" folder<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2025\/04\/22\/windows-ntlm-vulnerability-cve-2025-24054-is-being-exploited\/\" rel=\"bookmark\">Windows NTLM vulnerability CVE-2025-24054 is being exploited<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]On April 8\/9, 2025, Microsoft rolled out numerous security updates for the supported Windows versions, which were also intended to close the symlink vulnerability CVE-2025-21204. This made waves due to the Inetpub folder being patched on all Windows systems. It &hellip; <a href=\"https:\/\/borncity.com\/win\/2025\/04\/23\/april-2025-patch-for-windows-symlink-vulnerability-cve-2025-21204-tears-new-security-issue\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[463,580,22,2],"tags":[47,2906,69,195,194],"class_list":["post-37816","post","type-post","status-publish","format-standard","hentry","category-issue","category-security","category-update","category-windows","tag-issue","tag-patchday-4-2025","tag-security","tag-update","tag-windows"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/37816","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=37816"}],"version-history":[{"count":5,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/37816\/revisions"}],"predecessor-version":[{"id":37827,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/37816\/revisions\/37827"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=37816"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=37816"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=37816"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}