FCC seeks to expand security blacklist, potentially impacting future router sales

April 2, 20262 min read1 sources
Share:
FCC seeks to expand security blacklist, potentially impacting future router sales

WASHINGTON – The U.S. Federal Communications Commission (FCC) is considering an expansion of its criteria for blacklisting telecommunications equipment deemed a national security risk, a move that could eventually restrict the sale of certain foreign-made consumer routers. Contrary to some reports, the agency has not issued an immediate ban.

In a Public Notice issued March 12, the FCC’s Public Safety and Homeland Security Bureau solicited public comment on adding a new category to its "Covered List": any entity that produces advanced communications equipment and services found to pose an "unacceptable risk to national security." This procedural step opens the door for future designations but does not name specific router companies at this time.

Inclusion on the Covered List effectively bars new equipment from the U.S. market. The FCC is prohibited from authorizing equipment from listed entities, and federal funds cannot be used to purchase or maintain their products. This list already includes Chinese tech giants Huawei and ZTE, whose new equipment authorizations were halted in 2022 over espionage concerns.

The initiative stems from persistent government concerns about supply chain security. Officials worry that hardware manufactured in adversarial nations could contain hidden backdoors for surveillance or be used to disrupt network traffic, which many consumers attempt to protect using tools like a VPN. By targeting the equipment itself, the FCC aims to prevent potentially compromised devices from connecting to U.S. networks.

Should the FCC later use this expanded authority to designate specific router manufacturers, consumers could see a shift in the market. While the intended outcome is to improve security for home and business networks, potential impacts include reduced product selection and potentially higher prices for approved devices. The public has 30 days from the notice's publication to submit comments on the proposed criteria.

Share:

// SOURCES

// RELATED

Popular Axios npm package compromised to deliver cross-platform malware

Malicious versions of the widely used Axios HTTP client were published to the npm registry, injecting a trojan that targets Windows, macOS, and Linux.

2 min readApr 2

TrueConf zero-day exploited in attacks targeting Southeast Asian governments

A high-severity flaw in TrueConf video conferencing software was exploited as a zero-day to deliver malicious updates to government networks in Southe

2 min readApr 2

F5 BIG-IP vulnerability under active attack after RCE discovery

A critical F5 BIG-IP vulnerability (CVE-2023-46747) is under active attack, allowing unauthenticated attackers to gain full system control.

2 min readApr 2

Block the prompt, not the work: The end of 'Doctor No'

The traditional 'Doctor No' security approach of blocking new tools is failing. The rise of AI and shadow IT is forcing a shift to secure enablement.

2 min readApr 2