In a significant move to secure the U.S. technology supply chain, the Federal Communications Commission (FCC) has banned the import and sale of all new foreign-produced consumer-grade routers. Effective March 23, 2026, this entire product category was added to the FCC's "Covered List," a designation for equipment deemed to pose an unacceptable risk to national security. The decision follows a determination by a White House interagency body that these devices could be exploited by state-sponsored actors for espionage, data exfiltration, and attacks against U.S. critical infrastructure. The ban will profoundly impact the consumer networking market, affecting major manufacturers who produce devices in China and other foreign countries.
The FCC's action is based on authority granted by the Secure and Trusted Communications Networks Act. The core of the decision is the addition of "foreign-produced consumer-grade routers" to the Covered List. This means:
This decision was prompted by a formal determination from an Executive Branch interagency body, which found that threat actors, including state-sponsored groups like Volt Typhoon, Flax Typhoon, and Salt Typhoon, actively exploit vulnerabilities in such devices. The notice warned these routers could provide "built-in backdoors to American homes, businesses, critical infrastructure, and emergency services."
While the order does not name any specific country, it is widely seen as targeting Chinese manufacturers, which dominate the global market. Key companies affected include:
The FCC has indicated there will be a process for companies to seek exemptions, potentially through a "whitelisting" process where they can prove their devices and supply chains are secure.
This ban has significant business and operational impacts:
For affected manufacturers and importers:
For enterprises, this is a clear signal to re-evaluate supply chain risk for all networking equipment. Organizations should prioritize vendors who can demonstrate strong security practices throughout their development and manufacturing lifecycle.
Violation of the FCC's order can result in significant penalties, including fines and the seizure of unauthorized equipment. The primary enforcement mechanism is the denial of FCC authorization, which effectively blocks products from the U.S. market.
A White House interagency body provides a determination to the FCC that foreign-produced routers pose an unacceptable national security risk.
The FCC acts on the determination, adding foreign-produced consumer routers to its 'Covered List' and effectively banning new models.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.