LmCast :: Stay tuned in

FCC bans new routers made outside the USA over security risks

Recorded: March 24, 2026, 9 p.m.

Original Summarized

FCC bans new routers made outside the USA over security risks

News

Featured
Latest

TeamPCP deploys Iran-targeted wiper in Kubernetes attacks

Microsoft Azure Monitor alerts abused for callback phishing attacks

Crunchyroll probes breach after hacker claims to steal 6.8M users' data

Microsoft Exchange Online service change causes email access issues

FCC bans new routers made outside the USA over security risks

Launch your website faster with this $20 AI site builder deal

Firefox now has a free built-in VPN with 50GB monthly data limit

Microsoft fixes bug causing Classic Outlook sync issues with Gmail

Tutorials

Latest
Popular

How to access the Dark Web using the Tor Browser

How to enable Kernel-mode Hardware-enforced Stack Protection in Windows 11

How to use the Windows Registry Editor

How to backup and restore the Windows Registry

How to start Windows in Safe Mode

How to remove a Trojan, Virus, Worm, or other Malware

How to show hidden files in Windows 7

How to see hidden files in Windows

Webinars
Downloads

Latest
Most Downloaded

Qualys BrowserCheck

STOPDecrypter

AuroraDecrypter

FilesLockerDecrypter

AdwCleaner

ComboFix

RKill

Junkware Removal Tool

Deals

Categories

eLearning

IT Certification Courses

Gear + Gadgets

Security

VPNs

Popular

Best VPNs

How to change IP address

Access the dark web safely

Best VPN for YouTube

Forums
More

Virus Removal Guides
Startup Database
Uninstall Database
Glossary
Send us a Tip!
Welcome Guide

HomeNewsSecurityFCC bans new routers made outside the USA over security risks

FCC bans new routers made outside the USA over security risks

By Bill Toulas

March 24, 2026
04:41 PM
0

The Federal Communications Commission has updated its Covered List to include all consumer routers made in foreign countries, banning the sale of new models in the U.S.
The Covered List, created under the Secure and Trusted Communications Networks Act of 2019, is an FCC-maintained list of communications equipment and services that the U.S. government has determined to pose an unacceptable risk to national security or the safety of Americans.
The list previously included specific products and companies tied to security concerns, such as Kaspersky, Huawei, ZTE, Hikvision, and Dahua.
Adding all routers manufactured abroad to the Covered List follows a National Security Determination issued on March 20 by an Executive Branch interagency body.
According to the assessment, foreign-produced routers carry a supply-chain risk "that could disrupt the U.S. economy, critical infrastructure, and national defense." The  agency determined that these devices could also be used "to immediately and severely disrupt U.S. critical infrastructure and directly harm U.S. persons."
In support of the decision, the FCC highlights that foreign-made routers helped the Volt, Flax, and Salt Typhoon hackers carry out attacks that targeted vital U.S. infrastructure.

Exemptions and alternative approval path
Conditional approval has been granted to certain routers used in the U.S. Department of War (DoW) or the Department of Homeland Security (DHS) for drone systems, which have been determined not to constitute a security risk.
Also, the new rules do not bar foreign consumer-grade router makers from seeking approval in the U.S., as long as they transparently disclose:
Corporate and ownership structure, including any foreign government financial support and influence.
Manufacturing and supply chain details, including bill of materials, country of origin for all components, IP ownership details, manufacturing and assembly locations, and origin of software/firmware.
Plan to move critical components manufacturing to the United States, and provide a description of existing U.S.-based manufacturing or assembly processes.
Consumer impact
For regular consumers in the United States, the new rules are expected to have no immediate effect, as all existing routers will continue to be sold in the country.
In what concerns Unmanned Aircraft Systems (UAS) and their critical components, the FCC noted that it will allow software and firmware updates until at least January 1, 2027.
Access to new router models for U.S.-based consumers may become more difficult, and the devices may also become more expensive, as the regulatory approval process adds extra complications and costs.
Given that testing, approvals, and FCC certification typically take a couple of months, even when all conditions are met. In some cases, this might lead to a delay in entering the U.S. market.
Some manufacturers may also decide that the alternative certification pathway is not worth the effort - particularly due to the onshoring requirement - and exit the U.S. market, reducing model availability.

Red Report 2026: Why Ransomware Encryption Dropped 38%
Malware is getting smarter. The Red Report 2026 reveals how new threats use math to detect sandboxes and hide in plain sight.Download our analysis of 1.1 million malicious samples to uncover the top 10 techniques and see if your security stack is blinded.
Download The Report

Related Articles:
US disrupts SocksEscort proxy network powered by Linux malwareZero Trust: Bridging the Gap Between Authentication and TrustVaronis Atlas: Securing AI and the Data That Powers It How CISOs Can Survive the Era of Geopolitical Cyberattacks7 Ways to Prevent Privilege Escalation via Password Resets

Ban
Cybersecurity
FCC
Government
Hardware
Legal
National Security
Router

Bill Toulas
Bill Toulas is a tech writer and infosec news reporter with over a decade of experience working on various online publications, covering open-source, Linux, malware, data breach incidents, and hacks.

Previous Article

Post a Comment Community Rules

You need to login in order to post a comment

Not a member yet? Register Now

You may also like:

Popular Stories

Microsoft Azure Monitor alerts abused for callback phishing attacks

Trivy vulnerability scanner breach pushed infostealer via GitHub Actions

VoidStealer malware steals Chrome master key via debugger trick

Sponsor Posts

Overdue a password health-check? Audit your Active Directory for free

Are refund fraud methods targeting your brand? You can monitor the underground for these threats.

Cyber resilience without the complexity. Join Zero Networks to stop lateral movement fast.

Overdue a password health-check? Audit your Active Directory for free

AI is a data-breach time bomb: Read the new report

Follow us:

Main Sections

News
Webinars
VPN Buyer Guides
SysAdmin Software Guides
Downloads
Virus Removal Guides
Tutorials
Startup Database
Uninstall Database
Glossary

Community

Forums
Forum Rules
Chat

Useful Resources

Welcome Guide
Sitemap

Company

About BleepingComputer
Contact Us
Send us a Tip!
Advertising
Write for BleepingComputer
Social & Feeds
Changelog

Terms of Use - Privacy Policy - Ethics Statement - Affiliate Disclosure

Copyright @ 2003 - 2026 Bleeping Computer® LLC - All Rights Reserved

Login

Username

Password

Remember Me

Sign in anonymously

Sign in with Twitter

Not a member yet? Register Now


Reporter

Help us understand the problem. What is going on with this comment?

Spam

Abusive or Harmful

Inappropriate content

Strong language

Other

Read our posting guidelinese to learn what content is prohibited.

Submitting...
SUBMIT

The Federal Communications Commission (FCC) has implemented a significant shift in consumer electronics regulations, issuing an updated Covered List that effectively bans the sale of new routers manufactured outside of the United States. This action, formalized under the Secure and Trusted Communications Networks Act of 2019, stems from a National Security Determination issued by an Executive Branch interagency body. The core concern revolves around the potential supply-chain risks posed by foreign-produced routers, specifically their vulnerability to disruption of the U.S. economy, critical infrastructure, and national defense. Bill Toulas of BleepingComputer reports that these devices have been implicated in attacks targeting vital U.S. infrastructure, including incidents involving the Volt, Flax, and Salt Typhoon hacker groups.

The expansion of the Covered List to encompass all foreign-made routers represents a proactive measure to mitigate these security threats. However, the FCC implemented a conditional approval pathway for certain routers, notably those utilized by the Department of Defense (DoD) and the Department of Homeland Security (DHS) for drone systems. These exemptions were granted due to their deemed lack of security risks. Crucially, the new regulations do not prohibit foreign router manufacturers from seeking approval within the U.S., provided they adhere to stringent disclosure requirements. These require transparent detailing of corporate structure, ownership, manufacturing processes, and supply chain information, including disclosing any foreign government influence and the origin of all components and software. Furthermore, manufacturers must demonstrate a strategy for moving critical component manufacturing to the United States and provide details on existing U.S.-based manufacturing or assembly processes.

The immediate impact on consumers is expected to be minimal, as existing routers will remain available for purchase. However, accessing new router models may become more challenging and potentially more expensive, given the extended regulatory approval process, which typically takes several months. The requirement for manufacturers to “onsource” critical components will likely complicate the entry of foreign firms into the U.S. market, potentially leading to some exiting altogether due to the increased costs and complexities involved. A key concession granted is continued access to software and firmware updates for existing routers until January 1, 2027, providing a degree of security maintenance while the approval process continues. The FCC’s decision reflects a broader trend among national security agencies to scrutinize the origins of hardware components and software, particularly in sectors vital to infrastructure and defense.