FCC puts all foreign routers on its safety list and redefines the network hardware market

Published 6 min de lectura 160 reading

The United States Federal Communications Commission (FCC) has taken a step that changes the map of the network hardware market: it updated its "Covered List" to include all consumer routers manufactured abroad, which in practice prohibits the sale of new models imported into American territory unless they obtain exceptional approval. This is a measure which seeks to reduce risks to national security, but which also raises unknowns for consumers, manufacturers and service providers.

To understand the scope, the legal framework must be remembered: the "Covered List" is part of the Secure and Trusted Communications Networks Act 2019, the law which ordered the identification and restriction of communications equipment and services that represent an unacceptable risk to the country's networks and infrastructure. The FCC maintains this list and so far included specific products and signatures that had been linked to security problems, such as Huawei, ZTE, Kaspersky, Hikvision or Dahua. The official explanation and historical content of the list can be found on the FCC page on the Covered List. https: / / www.fcc.gov / general / cover-list and in the law Secure and Trusted Communications Networks Act (legal text).

FCC puts all foreign routers on its safety list and redefines the network hardware market
Image generated with IA.

The decision to put all foreign routers on the list was not arbitrary: it was based on a National Security Assessment issued by an inter-agency group of the Executive. This document concludes that routers produced outside the United States represent a vector of risk in the supply chain capable of disrupting the economy, critical infrastructure and defence capabilities. The FCC's own report accompanying the update details incidents in which foreign routers facilitated intrusion campaigns that affected essential systems, providing examples that agencies consider to be evidence of the threat; the report is available in the FCC's publication on National Security Determination. https: / / www.fcc.gov / sites / default / files / NSD-Routers0326.pdf and in the document explaining the reasons for inclusion https: / / docs.fcc.gov / public / attachments / DOC-420034A1.pdf.

It is important to assess how the ban is implemented. It is not that the routers already in place in shops or networks are immediately removed: the devices present on the market will remain legal. The measure affects the sale of new models manufactured abroad. In addition, the FCC opened an alternative way for foreign manufacturers to apply for conditional approval, provided they accept extreme transparency on their corporate structure, supply chains, intellectual property and plans to move to the US. The production of critical components. The guide to applying for these conditional approvals is published by the agency itself and explains the documentation requirements and expectations about manufacturing onshore https: / / www.fcc.gov / sites / default / files / Guidance-for-Conditional-Approvals-Submission0326.pdf.

There are also very specific exceptions: the FCC granted conditional approvals to certain units of routers used by the Department of War and the Department of National Security in unmanned air vehicle systems, determining that these specific uses do not present the same risk as the general consumer market. For software and firmware updates in critical components of UAS (drones) systems, the agency authorized the possibility of updates until at least 1 January 2027, giving an operational margin to operators and manufacturers while adjusting the regulation.

If we talk about real impact for the public, home users will not see immediate changes when connecting their current router. However, the door that allows new models to reach the shops is narrow: the certification process, the obligation to disclose supply chain data and the requirement of onshore can increase and delay the entry of equipment. Costs and administrative complexity could lead some manufacturers to decide that it is not worth competing on the US market, which would reduce the variety of models available and potentially push up prices.

From the technical point of view, the logic of the regulator is based: the router is the first point of contact between the domestic network and the rest of the Internet. If your firmware or components have back doors, intentional vulnerabilities or commitments in the supply chain, an attacker can obtain persistent access to domestic networks, small companies or even mediate attacks on more critical infrastructure. This is why the FCC's demands not only call for business transparency but also technical details: lists of materials, origin of each component, who owns the software and where the equipment is assembled.

The measure also reflects a greater trend in technology policy: the authorities seek to reduce the technological dependence of foreign suppliers on sensitive elements of infrastructure, a concern that has intensified since 2019 and has led to other regulatory actions and sanctions. For those who want to deepen the technical and political description of the measure, the FCC published the foundations and annexes with examples and evidence gathered by intelligence and security agencies http: / / docs.fcc.gov / public / attachments / DA-26-278A1.pdf.

FCC puts all foreign routers on its safety list and redefines the network hardware market
Image generated with IA.

At the industrial level, the foreseeable reactions range from compliance efforts and reengineering of supply chains to litigation or diplomatic pressure. Companies with the capacity to move part of their production to the United States or to trusted partners could adapt; others, without that flexibility, could leave the American market. The FCC has made it clear that it is not intended to lock the door, but to condition access according to the degree of transparency and risk mitigation.

For consumers who want to advance to possible side effects, it is reasonable to monitor warranty policies and manufacturer updates before buying a new device, and, where possible, keep the firmware up-to-date and apply good home security practices: change default passwords, segregate IoT devices into a separate network and enable robust encryption and authentication.

In short, the massive inclusion of foreign routers in the "Covered List" is an ambitious national security move that seeks to close large-scale risk vectors, but also introduces trade and supply friction. The balance between protecting critical infrastructure and maintaining a competitive and affordable market will be the way forward in the coming months: monitoring the applications for conditional approval, the responses of manufacturers and the decisions of the FCC will provide a clear view of whether this measure achieves its objective without increasing or impoverishing the digital experience of users.

Coverage

Related

More news on the same subject.