The FCC’s Router Ban Is About to Become a ‘Mess.’ Here’s What It Means for Your Home Network


In an unprecedented move, the Federal Communications Commission announced on March 23 that it will be banning the sale of new foreign-made Wi-Fi routers going forward, citing “unacceptable risks” to national security.

The ban doesn’t apply to any existing routers that the FCC has already authorized, so you don’t need to rush out and replace your router immediately. If you were thinking about buying a new router soon, I’d hold off until we learn more about how the ban shakes out.

The order currently applies to any new models “produced in foreign countries.” Router manufacturers can apply for an exemption, but so far, none have been granted “Conditional Approval” on the FCC’s website

This is a monumental development for the domestic Wi-Fi router market. With the exception of newer Starlink routers, nearly every router available for purchase in this country is at least partially manufactured outside the US, including TP-Link, Asus and Netgear. An estimated 60% of routers in the US are manufactured in China.

According to a list of FAQs published by the FCC, a router will be considered foreign-made if “any major stage of the process through which the device is made, including manufacturing, assembly, design and development” occurs outside the US. 

“Following President Trump’s leadership, the FCC will continue do our part in making sure that US cyberspace, critical infrastructure and supply chains are safe and secure,” said FCC Chair Brendan Carr in a statement

When CNET reached out to the FCC for more clarity on the order, we were referred to the commission’s “Covered List” FAQ page.

The FCC says that routers produced abroad were “directly implicated” in the Volt, Flax and Salt Typhoon cyberattacks. The Salt Typhoon attack specifically exploited Cisco routers to gain access to the networks of US internet providers like AT&T, Verizon and Lumen, which owns CenturyLink and Quantum Fiber.

“This is using an extremely blunt instrument, and it’s going to impact many harmless products in order to stem a real problem,” William Budington, a technologist for the digital rights nonprofit Electronic Frontier Foundation, told CNET. “This takes place in the context of mass defunding of cyberdefense initiatives. There’s a lack of a good federal testing lab for consumer grade routers due to budget cuts.”

This doesn’t mean you have to replace your existing router: The FCC clarified that the ban doesn’t apply to routers already purchased. However, you won’t be able to buy new routers that the FCC hadn’t already authorized before the ban. 

TP-Link specifically has been in the US government’s crosshairs for over a year, stemming from its ties to China, with more than half a dozen US departments and agencies reportedly backing a ban at the end of 2025.

But this week’s FCC action goes well beyond TP-Link and will affect nearly every router company operating in the US.

Can your router still be used?

You can still use your existing router, but there is one big caveat hidden in the FCC’s Public Notice: “All routers authorized for use in the United States may continue to receive software and firmware updates that mitigate harm to US consumers at least until March 1, 2027.”

Firmware updates are essential to both your router’s performance and security. Most router companies issue automatic firmware updates to fix security vulnerabilities as they pop up, and you may not even be aware when they happen.

If a router can’t update its firmware after March 1 of next year, it’s generally considered unsafe to continue using, as your Wi-Fi network could become vulnerable to malware or other cybersecurity threats without regular firmware updates.

“The risk is very real,” said Rik Ferguson, vice president of security intelligence at cybersecurity company Forescout. “If you find yourself in a situation where that update pipeline has been switched off, then you definitely have to consider whether you want to keep using that device.”

“The risk just keeps going the longer time passes, because chances are that there will be new vulnerabilities being found that you cannot patch,” added Daniel Dos Santos, vice president of research at Forescout.

Router companies are surely scrambling behind the scenes right now to get added to the FCC’s “Conditional Approval” list, which would allow them to sell new models and continue issuing software and firmware updates to routers that have already been approved. 

There is some wiggle room in there. The FCC notice specifically says “at least” March 1, so it’s possible the deadline will be pushed back.

But if your router hasn’t been added to the exemption list by this time next year, I’d recommend swapping it out for a model that has FCC approval to continue receiving firmware updates. 

“I don’t think it’s going to change the manufacturing landscape, because manufacturing processes are expensive to move and device manufacturers are probably going to just wait it out until the ban is lifted. So I don’t think it’s going to have the intended effect,” Budington said. 

Should I wait or rush to buy a new router? 

The FCC’s ban on foreign-made routers only applies to devices that haven’t already been approved. That means any router that’s currently for sale will still remain on the shelves, and you can continue to use your existing router as long as you’d like.

Because any router that’s available now has already gotten FCC authorization, there’s no need to rush out and buy a new router. In fact, I would recommend the opposite: holding off on buying a new router until some of the dust settles on the FCC order. That advice was echoed by the seven experts I polled for this story.

“I would recommend to wait at least for a few weeks or a month to see what are the real implications of this,” Sergey Shykevich, a threat intelligence manager at Check Point Research, told me.

If you buy a new router today, there’s a risk that the FCC won’t exempt it, and it will stop getting software and firmware updates after March 1 of next year.

“A lot of those routers are going to turn into pumpkins in a year unless they extend this waiver,” Alan Butler, senior counsel at the Electronic Privacy Information Center, told me.

CNET recently tested and reviewed more than 30 Wi-Fi routers, and while we stand by all of our picks, I’d recommend holding off on a purchase until we have more information on the FCC’s ban. 

Which routers are impacted by the ban?

Representatives for the FCC couldn’t tell me which specific router companies will be subject to the ban, but nearly every Wi-Fi router available in the US has some stage of “manufacturing, assembly, design and development” occurring outside the country. (Starlink is apparently the only exception; the company says its newer routers are manufactured in Texas, according to the BBC.) 

Untangling each router’s supply chain will be a complicated process, and router companies are likely already lobbying the FCC for “Conditional Approval.” 

“Every single one of these devices, even if the final assembly happens in California, for example, they’re all going to come with components that are manufactured in China, as an example,” Sonu Shankar, chief product officer at Phosphorus Cybersecurity, told CNET. 

CNET reached out to 10 of the top router manufacturers for comment. So far, companies seem to be taking a friendly public approach to the FCC, even when they’re clearly subject to the ban. Netgear, for example, highlighted its US headquarters, even though its routers are manufactured in Vietnam, Thailand, Indonesia and Taiwan.

Router company Status following the announcement
Asus Headquartered in Taiwan, subject to the ban.
Cisco Does not sell new consumer-grade routers, not subject to the ban.
D-Link Headquartered in Taiwan, subject to the ban.
Eero Manufacturing in Asia, subject to the ban.
Linksys Owned by Foxconn, a Taiwanese multinational. Subject to the ban.
Nest Manufacturing in Taiwan and Malaysia, subject to the ban.
Netgear Publicly supporting the ban, but has manufacturing in Vietnam, Thailand, Indonesia and Taiwan.
Starlink Routers are made in Texas, not subject to the ban.
Razer Dual headquarters in California and Singapore, likely subject to the ban.
Synology Headquartered in Taiwan, subject to the ban.
TP-Link Planning to establish US-based manufacturing, the company said the move is a “positive step.” Currently subject to the ban.

A Netgear representative told CNET in an email that the company commends the Trump administration and the FCC for their action toward a safer digital future. “As a US-founded and headquartered company with a legacy of American innovation, Netgear has long invested in security‑first design, transparent practices, and adherence to government regulations, and we will continue to do so,” the representative said.

TP-Link Systems Inc. also applauded the order. “Placing all manufacturers and their supply chains under the same scrutiny is a positive step in the direction of making the router industry more secure,” a TP-Link Systems representative told CNET in an email. According to the representative, the company had already been planning to establish US-based manufacturing. TP-Link says on its website that it has manufactured all products sold in the US in Vietnam since 2018.  

CNET also reached out to Asus, D-Link, Eero, Linksys, Nest, Razer and Synology, but has not yet received responses. 

What if you get your router from your ISP?

Nearly 70% of Americans rent their routers from their internet service provider. The FCC’s ban will impact them, too, as they also rely on foreign-made parts for their Wi-Fi equipment. 

The analytics site, Ookla, looked at speed tests from 2026 and found the top three Wi-Fi router vendors for four of the largest ISPs. None of them are manufactured entirely in the US. (Disclosure: Ookla is owned by the same parent company as CNET, Ziff Davis.)

Operator Verizon
(prior to Frontier acquisition)
Comcast Charter AT&T
(prior to Lumen transaction)
Top vendors 1. Arcadyan
2. Wistron
3. Netgear
1. Arris
2. Netgear
3. Technicolor
1. Askey
2. Sagemcom
3. Netgear
1. Humax
2. Nokia
3. Netgear

If you rent equipment from your ISP, you can take some comfort in knowing that it’s on them to be compliant with the FCC and keep your network secure. Doug Dawson, a veteran broadband analyst and author of the industry blog POTs and PANs, said ISPs have been taking a “wait and see” approach so far.

“There’s no panic right now. Whatever you’re using now is just fine with them,” Dawson told me. “ISPs are not anxious to replace people’s equipment. Nobody wants to go spend $100 a household.”

If you haven’t replaced your equipment in a few years, now’s a good time to call your ISP and ask about available options. They might not replace your equipment proactively on their own, but they often have equipment upgrades available if you ask.  

How to protect yourself if you have a foreign-made router

Router manufacturers aren’t always the most transparent about their supply chains, but unless you use a Starlink router, some component of your router’s manufacturing likely takes place outside the US. 

“Vulnerabilities don’t have an inclination towards a national origin,” Shankar told me. “It doesn’t matter if it’s a Chinese-made router or an American-made router if a user does not change a default password.” 

No matter where it’s from, your router will be far more secure if you follow some basic best practices. Here’s what experts recommend: 

  • Keep your firmware up to date: One of the most common ways malicious actors access your network is through outdated firmware. You can ensure your router has the latest firmware by enabling automatic updates in your router’s settings or manually downloading updates in the app or web portal.  
  • Strengthen your credentials: If you’ve never changed the default login credentials on your router, now’s the time to do it. Weak passwords are the cause of many common attacks. “Devices using default or weak passwords are easy targets,” Itay Cohen, a security researcher at Palo Alto Networks, told me in a previous interview. “Default or simple passwords can be easily brute-forced or guessed.” Most routers have an app that lets you update your login credentials from there, but you can also type your router’s IP address into a URL. These credentials differ from your Wi-Fi name and password, which should also be changed every 6 months or so. The longer and more random your password, the better
  • Consider using a VPN: For an added layer of protection, a virtual private network encrypts all your internet traffic and prevents your internet provider (or anyone else) from tracking the websites or apps you use. You can find CNET’s picks for the best VPN services here





Source link

Leave a Reply

Subscribe to Our Newsletter

Get our latest articles delivered straight to your inbox. No spam, we promise.

Recent Reviews


A brief introduction to IBM SIEM Qradar:

SIEM Qradar is a powerful security intelligence tool and offers cross-environment support. SIEM Qradar is a child product of the company “IBM”. The main aim to develop this tool is to provide accurate detection and prioritize the threats across multiple enterprises. This SIEM Qradar also offers data intelligent insight that helps the team to notify and respond quickly to any threat incident that happens. IBM SIEM Qradar can also be implanted in a cloud environment and on premise infrastructure to protect the data and devices. The core functionalities of IBM SIEM Qradar included are data collection and flow collections. Flow data consists of information about network activity information and hosts information between any two networking servers.

       Want to get  Qradar Training From Experts? Enroll Now to get free demo on Qradar Online Course!

Overview of IBM SIEM Qradar:

As we discussed above, IBM SIEM Qradar is a security and data protection platform, mainly developed to secure the business data, reduces risk, and protect the device from any kind of threats. There are various IBM SIEM Qradar console components are available such as Qradar product interface, flow views, administrative functions, asset information, reports, real time events, and offenses. Sometimes this Qradar acts as a host between any two networking sessions to protect the business data. One more important function of SIEM Qradar is to collect the IDS AND IPS cisco events with the help of SDEE protocol or commonly known as “Security device event exchange”.

The architecture of Qradar:

The Qradar architecture defines the core functionality and work nature of the system. In this section, we are going to determine the overall functionality of Qradar:

The following diagram explains the Qradar Architecture:

IMAGE

SIEM Training

  • Master Your Craft
  • Lifetime LMS & Faculty Access
  • 24/7 online expert support
  • Real-world & Project Based Learning

The core functionalities of IBM SIEM Qradar included are data collection, process, integrate, aggregate, and store them in an appropriate data base management system. Qradar platform makes use of these data to manage network security by offering real-time information, monitoring, and responds to various network threats. IBM SIEM Qradar architecture is based on a modular architecture that supports real-time data visibility of any information technology information, and also helps for threat detections. There are various Qradar modules included are Qradar platform, Qradar vulnerability, Qradar data manager, Qradar risk manager, and Qradar incident forensics. The Qradar security intelligence platform composed of three layers they are data collection, data searches, and data processing.

[ Related Article: qradar training ]

, Cyber Security & SIEM Tools, qradar-siem-description-0, , Cyber Security & SIEM Tools, qradar-siem-description-1

Subscribe to our YouTube channel to get new updates..!

Qradar core components:

The following are the IBM SIEM Qradar core components, they are;

1. Qradar Console:

a. Qradar console offers the user interface, real time data events, administrative functions, offenses, and asset information.

b. In the distributed Qradar data deployment, we make use of the Qradar console to manage the networking hosts and components functionalities.

2. Qradar event collector:

a. The Qradar event collector helps to collect the events from remote and local log sources and then normalizes the raw data log source events.

b. Usually these event collectors are types of bundles and coalesces identical events to transfer the data to the data processor.

c. The event collector does not store the events locally and parse the events for storage.

d. This event collector will be assigned to an EPS license that matches the Qradar event processor.

3. Qradar Event processor:

a. This Qradar event processor helps to process the events that are collected from one or more event collectors.

b. The event processor processes the Qradar events with the help of the Customs Rules engine (CRE). These events are predefined and execute the action that is specified for the rules.

c. Each event processor consists of local storage and the data will be stored on the Qradar processor.

d. You can also add an event processor component to an all-in-one appliance and each event processing function will be moved from the all-in-one appliance to the Qradar event processor.

4. Qradar Qflow collector:

a. The Qradar flow collector helps to collect the data flows by connecting them to the SPAN port or any networking TAP portal.

b. These types of Qradar Qflow collectors are not designed for full packet capture systems. To get the full packet capture you need to review the incident forensic options.

c. User can also install a Qradar Qflow collector on their own hardware system and also enables you to make use of Qflow collector appliances.

5. Qradar flow processor:

a. The Qradar flow processor helps to flow data from one or more Qflow collector appliances. The flow processor appliance can also be used to collect the external networking data flows they are Net Flow, S flow, and J flow.

b. User can also use the Qradar flow processor appliance to scale the Qradar deployment to maintain the higher data flow per minute.

c. This type of flow processor consists of on board data flow processor and internal storage.

6. Qradar data nodes:

a. This Qradar data node supports new and existing Qradar deployment to ass appropriate storage and processes them as per your requirement.

b. Qradar data node also helps to increase the data search speed and offers more hardware resources to run your device.

7. Qradar App host:

a. This Qradar App host is used to manage the network host to run your applications. App host offers extra data storage, CPU resources, and Memory for your application without affecting the processing capacity of the Qradar console.

b. The applications such as User behavior analytics and machine learning analytics need more resources on the Qradar console.

Qradar appliances:

The following are the various Qradar appliances:

1. Qradar security intelligence platform appliances:

IBM Qradar security intelligence platform is very comprehensive, offers next-generation security solutions and risk management appliances. This appliance offers services like integrated log management, event management, and security services.

2. Qradar security management appliances:

This is a Qradar network security management appliance and related software application. This offers enterprise-level integration with an integrated framework that helps to combine disparate networks.

3. Qradar QFLOW collector appliances for security intelligence:

This IBM Qradar Qflow collector mainly used for security intelligence management appliances and this offers advanced network data analytic solutions.

Features of IBM SIEM Qradar:

Below are the advanced features of IBM SIEM Qradar:

1. Task scanner – the task scanner component scans the specified properties, on a scheduled time intervals. This scanning mechanism executes the tasks when the property value matches a specified value.

2. Script Engine – this scripting engine is a pluggable component module that provides the triggering and plugin points for the Identity management system. It can be performed using JavaScript and Groovy programming language.

3. Policy Service – This component used to apply the validation procedures to objects or properties, when they are updated or created.

4. Audit Logging – Audit logging performs the logging activities of all the relevant system users and also configures the log stores. This uses the reconciliation data as a base for reporting and activity logs to capture the internal and external object’s operations.

5. Repository – This component abstracts the pluggable persistence layer. IDM framework modular provides Reconciliation of data and synchronization with several external data stores like relational databases (RDBMS), LDAP data servers, CSV, and XML files.

The Repository API component uses the JSON-based object model with RESTful automation tool principles. The main purpose of using this component is for testing and embedded instances for Qradar services.

Benefits of IBM SIEM Qradar:

Below are the key benefits of IBM SIEM Qradar:

1. Easy to deploy, scalable model using stackable distributed appliances.

2. Qradar doesn’t require any storage database management system.

3. Offers automatic failover and disaster recovery.

4. Cloud environment, on premise, and hybrid deployment.

5. Software, hardware, and virtual resource deployments.

Join our Juniper Networks Certified Internet Professional Training today and enhance your skills to new heights!

SIEM Training

Weekday / Weekend Batches

Conclusion:

In this IBM SIEM Qradar blog, we have tried to cover basic to core concepts of Qradar and to write them in an understanding purpose we have taken expert guidance. SIEM Qradar is an IBM product and mainly used to protect the business data, devices, and software components from any malware attacks and threats. One more important point to be considered here, this Qradar tool can also be deployed on cloud and on premise environment. If you are working as a security architect, then this blog will be more beneficial.



Source link