Momentum Builds for Memory-Safe Languages to Mitigate Critical Vulnerabilities
Published Nov 16, 2025
On 2025-06-27 CISA and the NSA issued joint guidance urging adoption of memory-safe programming languages (MSLs) such as Rust, Go, Java, Swift, C#, and Python to prevent memory errors like buffer overflows and use‐after‐free bugs; researchers cite that about 70–90% of high‐severity system vulnerabilities stem from memory‐safety lapses. Google has begun integrating Rust into Android’s connectivity and firmware stacks, and national‐security and critical‐infrastructure organizations plan to move flight control, cryptography, firmware and chipset drivers to MSLs within five years. The shift matters because it reduces systemic risk to customers and critical operations and will reshape audits, procurement and engineering roadmaps. Immediate actions recommended include defaulting new projects to MSLs, hardening and auditing C/C++ modules, investing in Rust/Go skills and improved CI (sanitizers, fuzzing, static analysis); track vendor roadmaps (late 2025–2026), measurable CVE reductions by mid‐2026, and wider deployments in 2026–2027.