Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
CISA Demands Removal of Outdated Network Devices

CISA Demands Removal of Outdated Network Devices

Posted on February 6, 2026 By CWS

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a new directive, Binding Operational Directive (BOD) 26-02, requiring the Federal Civilian Executive Branch (FCEB) agencies to remove outdated edge devices from their networks. This directive aims to mitigate security risks associated with end-of-support (EOS) hardware, including firewalls, routers, and VPN gateways, that form the boundary of network infrastructures.

Significance of Removing Unsupported Devices

Developed in collaboration with the Office of Management and Budget (OMB), this directive targets the vulnerabilities posed by unsupported devices. These devices, located at network boundaries and accessible from the internet, include load balancers, switches, and wireless access points. Their lack of ongoing security updates makes them prime targets for cybercriminals and state-sponsored actors seeking entry into deeper network layers.

CISA highlights that these outdated edge devices can be exploited by advanced threat actors, posing a “substantial and constant” threat. Once compromised, these devices can be used to intercept traffic, steal credentials, and facilitate further attacks on internal systems. Recent incidents have demonstrated how attackers exploit these vulnerabilities to bypass perimeter defenses effectively.

Detailed Timeline for Compliance

The directive outlines a structured timeline for the phased removal of unsupported hardware. Agencies must immediately update any edge devices running EOS software to supported versions, ensuring no disruption to mission-critical functions. Within three months, agencies are required to inventory their edge devices against a CISA-provided list of known EOS hardware and report their findings.

Within 12 months, all devices identified on CISA’s initial EOS list must be decommissioned, with a follow-up inventory of all other EOS devices in their environment. By 18 months, any remaining EOS devices must be replaced with supported alternatives. Finally, within 24 months, agencies need to establish a continuous lifecycle management process to proactively replace devices nearing their end-of-support date.

Broader Implications and Support

While BOD 26-02 specifically targets federal civilian agencies, CISA aims for this directive to serve as a benchmark for other sectors. Local governments, critical infrastructure operators, and private businesses are encouraged to adopt similar practices. This initiative aligns with the federal government’s Zero Trust architecture goals, as outlined in OMB Memorandum M-22-09, to reduce the attack surface by eliminating vulnerable perimeter devices.

Moreover, CISA will provide technical guidance, reporting templates, and an evolving list of EOS devices to assist agencies with this transition. The directive also reinforces OMB Circular A-130, which mandates the phasing out of unsupported information systems, ensuring federal networks are not left exposed to unpatched vulnerabilities.

For further updates on cybersecurity developments, follow CISA on Google News, LinkedIn, and X. Agencies and organizations are urged to comply with these practices to safeguard their networks against evolving threats.

Cyber Security News Tags:CISA, Cybersecurity, device lifecycle management, edge devices, EOS hardware, federal agencies, network security, OMB, security risks, Zero Trust

Post navigation

Previous Post: Microsoft 365 Vulnerabilities: Phishing and OAuth Exploits
Next Post: China-Linked DKnife Framework Exploits Routers for Attacks

Related Posts

Moltbook AI Vulnerability Exposes Email Addresses, Login Tokens, and API Keys Moltbook AI Vulnerability Exposes Email Addresses, Login Tokens, and API Keys Cyber Security News
North Korean Hackers Using Malicious Scripts Combining BeaverTail and OtterCookie for Keylogging North Korean Hackers Using Malicious Scripts Combining BeaverTail and OtterCookie for Keylogging Cyber Security News
Ransomware Actors Targeting Global Public Sectors and Critical Services in Targeted Attacks Ransomware Actors Targeting Global Public Sectors and Critical Services in Targeted Attacks Cyber Security News
Beware of Weaponized Employee Performance Reports that Deploys Guloader Malware Beware of Weaponized Employee Performance Reports that Deploys Guloader Malware Cyber Security News
Free WormGPT Variant Leveraging DeepSeek, Gemini, and Kimi-K2 AI Models Free WormGPT Variant Leveraging DeepSeek, Gemini, and Kimi-K2 AI Models Cyber Security News
Microsoft Unveils Hardware-Accelerated BitLocker to Enhance Performance and Security Microsoft Unveils Hardware-Accelerated BitLocker to Enhance Performance and Security Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News