The United States Infrastructure and Cybersecurity Agency (CISA) has launched a mandatory order that requires federal agencies to identify and remove from their networks the border devices - such as routers, firewalls and switches - that no longer receive security updates from their manufacturers. With this measure, the administration seeks to address a risk that, according to CISA, facilitates systematic exploitation by advanced actors and leaves critical systems exposed to newly discovered vulnerabilities.
The fundamental problem is simple and urgent: When a computer or software enters its "end-of-support" stage, it stops receiving patches. That makes that team a permanent target for attackers looking for uncorrected vulnerabilities. The new directive, called Binding Operational Directive 26-02, requires federal agencies to act with specific time frames: to invent devices in an end-of-support list in a few months, to immediately remove those for which updates are available, and to complete the replacement of all off-support equipment within a wider period of months. You can read the text of the directive on the official CISA page Here..

The standard divides the actions into phases: first, a rapid and prioritized identification of vulnerable devices; then, the immediate uninstallation or updating of equipment where the manufacturer still offers patches; in the medium term, the retirement of hardware that was already out of support before the order; and finally, the implementation of continuous processes to discover and monitor the inventory of the edge infrastructure. In parallel, CISA encourages non-federal network operators and advocates to implement the same recommendations by consulting an IC3 team information sheet available here.
Why a focus on the edge devices? Because these devices control the flow of traffic between internal and external networks; a vulnerable router or firewall can be the gateway to an entire network. In addition, they are often managed less rigorously than servers or workstations, are installed in heterogeneous environments and sometimes remain without revision. This combination makes them an attractive vector for automated exploitation campaigns and for actors seeking to pivote into more valuable assets within an organization.
The mandate is the result of incidents and trends observed by the CISA itself and the security community: extensive exploitation of end-of-life devices, targeted attacks that use vulnerabilities without patches or weak credentials, and the existence of persistent campaigns that use these weaknesses to introduce ransomware, back doors or steal information. The agency has been issuing similar directives in recent years; for example, in 2023 it published another order to close management interfaces exposed on the Internet - a related problem - and in parallel launched pilot programmes to warn organizations about the risks of ransomware on their network devices.
What can organizations do today, even if they are not federal agencies? The first measure is simple in concept but requires work: to know what is connected to the network. Maintaining an updated and automated inventory of equipment and software / firmware versions is the basis for any security effort. It is then recommended to segregate traffic, apply strict access controls for management interfaces, monitor with intrusion detection and rely on compensatory measures (such as white lists, deep package inspection or segmentation) while replacing critical equipment. CISA and other agencies offer guides and technical sheets with concrete measures; the IC3 directive and information sheet are good starting points, and the NIST Cybersecurity Framework can help prioritize risks and controls ( NIST Cybersecurity Framework).

There is, however, a practical dimension that often complicates implementation: costs and life cycle management. Organizations face limited budgets, supplier contracts and interoperability of existing systems. This is why CISA structures the directive with time-limits: it allows to prioritize more critical assets and to apply temporary solutions in the least urgent, always with the obligation to reach a supported infrastructure. However, the agency stresses that keeping equipment out of support is no longer an acceptable option in terms of risk.
The implicit message for the private sector and IT administrators is clear: even if the order is mandatory only for certain agencies, no one should rely on devices that do not receive patches. Network advocates must assume that the attackers are already looking for those back doors, and act accordingly. For those who want media coverage and topic analysis, specialized media have closely followed the announcement; for example, you can find a technical report on the order and its implications in security media such as BleepingComputer Here..
In the end, this directive is a call for attention: the attack surface is not abstract, it is made up of physical and virtual equipment with expiry dates. Identify, patch or replace, and maintain continuous discovery processes - that is the way to reduce avoidable risks -. Organizations taking these measures will now be better placed to resist the exploitation campaigns that, according to CISA, are already being deployed against edge devices worldwide.
Related
More news on the same subject.

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

The digital signature is in check: Microsoft dismands a service that turned malware into apparently legitimate software
Microsoft announced the disarticulation of a "malware-signing-as-a-service" operation that exploited its device signature system to convert malicious code into seemingly legitim...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

Identity is no longer enough: continuous verification of the device for real-time security
Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and...

The dark matter of identity is changing the rules of corporate security
The Identity Gap: Snapshot 2026 report published by Orchid Security puts numbers to a dangerous trend: the "dark matter" of identity - accounts and credentials that are neither ...

PinTheft the public explosion that could give you root on Arch Linux
A new public explosion has brought to the surface again the fragility of the Linux privilege model: the V12 Security team named the failure as PinTheft and published a concept t...