Momentum Builds for Memory-Safe Languages to Mitigate Critical Vulnerabilities

Momentum Builds for Memory-Safe Languages to Mitigate Critical Vulnerabilities

Published Nov 16, 2025

On 2025-06-27 CISA and the NSA issued joint guidance urging adoption of memory-safe programming languages (MSLs) such as Rust, Go, Java, Swift, C#, and Python to prevent memory errors like buffer overflows and use‐after‐free bugs; researchers cite that about 70–90% of high‐severity system vulnerabilities stem from memory‐safety lapses. Google has begun integrating Rust into Android’s connectivity and firmware stacks, and national‐security and critical‐infrastructure organizations plan to move flight control, cryptography, firmware and chipset drivers to MSLs within five years. The shift matters because it reduces systemic risk to customers and critical operations and will reshape audits, procurement and engineering roadmaps. Immediate actions recommended include defaulting new projects to MSLs, hardening and auditing C/C++ modules, investing in Rust/Go skills and improved CI (sanitizers, fuzzing, static analysis); track vendor roadmaps (late 2025–2026), measurable CVE reductions by mid‐2026, and wider deployments in 2026–2027.

CISA and NSA Urge Switch to Memory-Safe Languages to Cut Vulnerabilities

What happened

U.S. agencies CISA and the NSA on 27 Jun 2025 issued joint guidance urging developers to adopt memory-safe programming languages (MSLs) such as Rust, Go, Java, Swift, C#, and Python to reduce memory errors like buffer overflows and use‐after‐free bugs. The move follows high‐impact vulnerabilities in C/C++ libraries (notably OpenSSL) and growing adoption of Rust inside major platforms—Google is already rewriting parts of Android’s connectivity and firmware stacks and plans wider use across server, embedded, and cloud components. Researchers cited in the coverage estimate 70–90% of high‐severity system vulnerabilities stem from memory‐safety lapses.

Why this matters

Policy and engineering shift — reduces systemic security risk. If widely adopted, MSLs could materially lower the incidence of severe memory‐related bugs across operating systems, firmware, drivers and network stacks—areas attractive to attackers and critical to national infrastructure. The guidance signals regulatory momentum and aligns government, academia and large vendors behind a multi‐year transition strategy (some national‐security systems targeting MSL migration within 5 years).

Practical implications:

  • New projects should default to MSLs for external‐facing components (parsers, protocol handlers, firmware updates).
  • Legacy C/C++ code and libraries remain the main risk: full rewrites are costly and risky, so incremental migration, sandboxing, FFI boundaries and translation tools will be essential.
  • Tooling and ecosystem maturity (compilers, libraries, sanitizers, fuzzers) are improving, making migration more feasible, though performance‐critical or real‐time domains may still rely on C/C++ for now.

Watch for vendor roadmaps (OS and driver support), measurable drops in CVEs attributable to memory bugs, and advances in automated migration tooling over 2025–2027.

Sources

  • Coverage of the CISA/NSA guidance and industry context — The Register: https://www.theregister.com/2025/06/27/cisansacallformemorysafe_languages/
  • Analysis of Rust and memory safety trends — Wired: https://www.wired.com/story/rust-secure-programming-language-memory-safe/
  • Academic/industry perspective on migration and infrastructure — MIT News: https://news.mit.edu/2025/memory-safety-tipping-point-0618
  • CPO Magazine summary and implications — CPO Magazine: https://www.cpomagazine.com/cyber-security/new-cisa-nsa-joint-report-reiterates-call-for-memory-safe-languages/

Accelerating Memory-Safe Language Adoption in Critical Systems by 2027

  • High-severity vulnerabilities attributable to memory safety — 70–90% (scope: system components)
  • Critical component migration to memory-safe languages — 5 years (target; scope: flight-control, cryptography, firmware, chipset drivers in national security and critical infrastructure)
  • Memory-safe roadmap publication by major OS vendors — Late 2025–2026 (target timeframe; scope: Google, Microsoft, Apple)
  • Deployment of critical infrastructure subsystems in MSLs — 2026–2027 (target timeframe; scope: firmware, network stacks)
  • Automated migration tooling improvements — 12 months (target timeframe; scope: tools for migrating unsafe to safe language components)

Mitigating Risks and Constraints in Adopting Memory-Safe Languages

  • Regulatory and security exposure from unsafe languages: On 2025-06-27, CISA and NSA urged adoption of memory-safe languages; 70–90% of high-severity vulnerabilities in system components are tied to memory safety lapses, leaving critical infrastructure and vendors exposed. Opportunity: default new code to Rust/Go/Swift/Java/C#/Python and prioritize network stacks, parsers, firmware, and drivers; early adopters can cut CVEs and align with guidance—benefiting platform owners, critical-infrastructure operators, and government suppliers.
  • Legacy migration, FFI, and performance constraints: Large C/C++ bases are costly/risky to rewrite, MSLs that call unsafe libraries lose guarantees, and real-time firmware/kernel modules may still require C/C++ for latency/determinism—risking uneven security gains across systems. Mitigation: use incremental hardening (translation tools, sandboxing unsafe parts) and stage critical subsystems over ~5 years, benefiting teams balancing reliability with delivery timelines.
  • Known unknown: Pace and measurable payoff of MSL adoption: OS vendor roadmaps (late 2025–2026), CVE reduction data (by mid-2026), and deployments in stringent domains (2026–2027) are pending, with uncertainty over migration speed in legacy/performance-critical environments. Opportunity: organizations that instrument metrics and hit these milestones early can validate risk reduction and secure budget/policy support (est.; based on rising regulatory scrutiny), benefiting security and platform leaders.

Upcoming Milestones Driving Memory-Safe Software Adoption and Security Advances

PeriodMilestoneImpact
Q4 2025 (TBD)Public memory-safe roadmaps released by Google, Microsoft, Apple for OS platformsSets expectations for compatibility, driver support; accelerates vendor and developer adoption
Q1 2026 (TBD)Tooling improvements for automated migration from C/C++ to memory-safe components releasedReduces cost, risk of rewrites; enables incremental hardening at scale
Q2 2026 (TBD)Measurable reduction in high-severity CVEs from memory-safety flaws in major projectsValidates safety claims; informs risk quantification and regulatory policy direction
Q4 2026 (TBD)Deployment of critical infrastructure subsystems—firmware, network stacks—implemented in MSLs across production environmentsDemonstrates feasibility under performance constraints; shifts procurement toward memory-safe defaults

Memory Safety Revolution: Why Containment, Not Rewrite, Wins for Critical Code

Depending on your lens, the push for memory‐safe languages is either overdue root‐cause control or a costly detour from hardening what we already ship. Supporters cite CISA and NSA’s June guidance, Google weaving Rust into Android, and research (via Wired) that “70–90%” of high‐severity bugs stem from memory‐safety lapses; they frame it as governments moving from reactive patches to proactive design. Skeptics counter with the ARTICLE’s own caveats: complete recompilation isn’t feasible; MSLs often call into unsafe libraries where guarantees are diluted; and real‐time firmware and kernel modules still press C/C++ for latency and determinism. Wired notes that recent open‐source bugs reignited attention toward what was once seen as “legacy” risk, but calling it “legacy” doesn’t make it go away. Provocation: if so many severe flaws trace to memory safety, why are flight‐control, cryptography, and firmware on five‐year timelines? Even with confidence pegged around 88/100, the pace in legacy‐heavy and performance‐critical domains remains uncertain.

Here’s the counterintuitive takeaway: the fastest path isn’t a heroic rewrite—it’s containment. The ARTICLE’s facts point to a strategy of writing new code in Rust, Go, Swift, and peers at the input edges (network stacks, parsers, drivers), aggressively auditing C/C++ modules, sandboxing unsafe parts, and leaning on translation tools and growing FFIs to bridge the rest. What shifts next will be visible on the scoreboard, not the roadmap: look for late‐2025/26 OS vendor plans, measurable drops in high‐severity memory‐safety CVEs by mid‐2026, and early deployments of firmware and network subsystems in MSLs by 2026–27, as teams skill up and wire fuzzing and static analysis into CI/CD. The revolution, in other words, won’t arrive as a rewrite—it will arrive as a boundary that keeps moving inward.