News Security

Check Point Research Uncovers Six New Microsoft Vulnerabilities, Including First Rust-Based Kernel Flaw

Check Point Research

Critical flaws patched in August update highlight risks of system crashes, remote code execution, and network-linked data leaks

Check Point Research has revealed six newly discovered vulnerabilities in Microsoft Windows, including a critical flaw in a Rust-based kernel component—marking a significant moment in the evolution of software security. The vulnerabilities, responsibly disclosed to Microsoft, were patched in the August 12 Patch Tuesday update.

Among the most notable findings is a Rust-based kernel vulnerability capable of triggering full system crashes. While Rust is widely adopted for its memory safety features, this flaw demonstrates that even modern languages can introduce new risks when integrated into complex systems. Attackers could exploit this bug to crash multiple machines across an enterprise, causing widespread disruption.

“Rust was supposed to be the answer to memory safety,” said Sameer Basha, Lead Security Engineer at Check Point. “But this discovery shows that implementation matters just as much as language choice.”

“Even with Rust’s memory safety promises, attackers are finding new ways to crash systems and compromise data. Vigilance is non-negotiable.”

— Sameer Basha, Lead Security Engineer, GCC, Check Point Software Technologies Ltd.

Two additional vulnerabilities—CVE-2025-30388 and CVE-2025-53766—allow for arbitrary code execution via specially crafted files. These critical flaws could enable attackers to install malware, gain remote control, or launch further attacks, posing serious threats to business continuity.

Another vulnerability, CVE-2025-47984, enables information disclosure over the network, allowing attackers to remotely access sensitive memory contents without physical access. This elevates the risk profile significantly, especially for organizations with distributed or cloud-based infrastructures.

Check Point emphasized the importance of immediate patching and proactive threat detection. While Microsoft users must apply the August updates to stay protected, Check Point customers are already safeguarded—thanks to real-time detection and blocking capabilities built into its security solutions.

These findings underscore the need for continuous vigilance, even as software development evolves toward safer paradigms. As attackers adapt, so must defenders—by combining secure coding practices with robust threat intelligence and rapid response capabilities.

To learn more about the vulnerabilities and how to stay protected, visit Check Point Research.

Related posts

Cloudflare Flags Perplexity for Stealth Crawling and Violating No-Crawl Directives

Enterprise IT World MEA

Kissflow Named Sample Vendor for No-Code Platforms in 2025 Gartner® Hype Cycle™ for Enterprise Process Automation

Enterprise IT World MEA

In an Age of Uncertainty, the Risk Operations Center Should Be Every Business’s Next Strategic Move

Enterprise IT World MEA

Leave a Comment