Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
CISA Demands Removal of Outdated Network Devices

CISA Demands Removal of Outdated Network Devices

Posted on February 6, 2026 By CWS

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a new directive, Binding Operational Directive (BOD) 26-02, requiring the Federal Civilian Executive Branch (FCEB) agencies to remove outdated edge devices from their networks. This directive aims to mitigate security risks associated with end-of-support (EOS) hardware, including firewalls, routers, and VPN gateways, that form the boundary of network infrastructures.

Significance of Removing Unsupported Devices

Developed in collaboration with the Office of Management and Budget (OMB), this directive targets the vulnerabilities posed by unsupported devices. These devices, located at network boundaries and accessible from the internet, include load balancers, switches, and wireless access points. Their lack of ongoing security updates makes them prime targets for cybercriminals and state-sponsored actors seeking entry into deeper network layers.

CISA highlights that these outdated edge devices can be exploited by advanced threat actors, posing a “substantial and constant” threat. Once compromised, these devices can be used to intercept traffic, steal credentials, and facilitate further attacks on internal systems. Recent incidents have demonstrated how attackers exploit these vulnerabilities to bypass perimeter defenses effectively.

Detailed Timeline for Compliance

The directive outlines a structured timeline for the phased removal of unsupported hardware. Agencies must immediately update any edge devices running EOS software to supported versions, ensuring no disruption to mission-critical functions. Within three months, agencies are required to inventory their edge devices against a CISA-provided list of known EOS hardware and report their findings.

Within 12 months, all devices identified on CISA’s initial EOS list must be decommissioned, with a follow-up inventory of all other EOS devices in their environment. By 18 months, any remaining EOS devices must be replaced with supported alternatives. Finally, within 24 months, agencies need to establish a continuous lifecycle management process to proactively replace devices nearing their end-of-support date.

Broader Implications and Support

While BOD 26-02 specifically targets federal civilian agencies, CISA aims for this directive to serve as a benchmark for other sectors. Local governments, critical infrastructure operators, and private businesses are encouraged to adopt similar practices. This initiative aligns with the federal government’s Zero Trust architecture goals, as outlined in OMB Memorandum M-22-09, to reduce the attack surface by eliminating vulnerable perimeter devices.

Moreover, CISA will provide technical guidance, reporting templates, and an evolving list of EOS devices to assist agencies with this transition. The directive also reinforces OMB Circular A-130, which mandates the phasing out of unsupported information systems, ensuring federal networks are not left exposed to unpatched vulnerabilities.

For further updates on cybersecurity developments, follow CISA on Google News, LinkedIn, and X. Agencies and organizations are urged to comply with these practices to safeguard their networks against evolving threats.

Cyber Security News Tags:CISA, Cybersecurity, device lifecycle management, edge devices, EOS hardware, federal agencies, network security, OMB, security risks, Zero Trust

Post navigation

Previous Post: Microsoft 365 Vulnerabilities: Phishing and OAuth Exploits
Next Post: China-Linked DKnife Framework Exploits Routers for Attacks

Related Posts

Critical Convoy Vulnerability Let Attackers Execute Remote Code on Affected Servers Critical Convoy Vulnerability Let Attackers Execute Remote Code on Affected Servers Cyber Security News
Spotify Launches Direct Message Feature for Music Sharing, What are the Risks Associated? Spotify Launches Direct Message Feature for Music Sharing, What are the Risks Associated? Cyber Security News
CISA Warns of Fortinet FortiWeb SQL Injection Vulnerability Exploited in Attacks CISA Warns of Fortinet FortiWeb SQL Injection Vulnerability Exploited in Attacks Cyber Security News
Android Photo Frames App Downloads Malware, Giving Hackers Control of The Device Without User Interaction Android Photo Frames App Downloads Malware, Giving Hackers Control of The Device Without User Interaction Cyber Security News
Allianz Life Data Breach Exposes Personal Records of 1.5 Million Users Allianz Life Data Breach Exposes Personal Records of 1.5 Million Users Cyber Security News
Sonesta International Hotels Implements Industry-Leading Cloud Security Through AccuKnox Collaboration Sonesta International Hotels Implements Industry-Leading Cloud Security Through AccuKnox Collaboration Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Odyssey Stealer Escalates Threats to macOS Users
  • RenEngine Loader Bypasses Security with Multi-Stage Attack
  • China-Linked Hackers Target Linux Devices with Malware
  • China-Linked DKnife Framework Exploits Routers for Attacks
  • CISA Demands Removal of Outdated Network Devices

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Odyssey Stealer Escalates Threats to macOS Users
  • RenEngine Loader Bypasses Security with Multi-Stage Attack
  • China-Linked Hackers Target Linux Devices with Malware
  • China-Linked DKnife Framework Exploits Routers for Attacks
  • CISA Demands Removal of Outdated Network Devices

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark