runZero Findings feature for CISA BOD 26-02

|
Updated

Heya! Remember when we first talked about CISA’s new BOD 26-02 on End-of-Service (EOS) edge devices back in early February, then provided a handy query to find such internet-exposed EOS devices on your own network? 

Well, we’ve gone and made it even easier with a new Findings tab, right in the console (coming later today!). Down with typey-typing, and up with clicky-clicking! 

Check it out:

For those who missed the earlier posts, BOD 26-02 is CISA’s two-year program requiring federal civilian agencies to identify and address unsupported edge devices like firewalls, VPNs, routers, proxies, etc. The clock started ticking on February 5th which means the first milestone of having a mechanism in place to identify all edge devices (supported and unsupported) in production begins on May 5, 2026.

One wrinkle worth noting is that unlike BOD 22-01 and the KEV, CISA decided to keep their official EOL edge device list private. This Finding maps directly to the query we shared last time, surfacing devices in “EOL Extended” state that are exposed to the public internet and aren’t normal servers, desktops, or laptops.

With this update — free to all customers, even the free-trial folks — runZero users can enjoy a consistent, obvious way to track against what CISA (and we) believe are some of the most critically exposed assets on your network. Going forward, we’ll continue to make things easy and clear for you with this Findings tab as we integrate more fingerprints and profiles of commonly-attacked endpoints, so you can get down to the business of upgrading, retiring, or segmenting off these attractive-to-attackers assets.

Written by todb

Tod Beardsley is VP of Security Research at runZero, where he "kicks assets and fakes frames." Prior to 2025, he was the Section Chief for the Vulnerability Response section for CSD/VM/VRC at CISA, the Cybersecurity and Infrastructure Security Agency, part of the US government, and a seasonal Travis County Election Judge in Texas. He's also a founder and CNA point of contact for AHA!. Tod spends much of his time involved in vulnerability research and coordinated vulnerability disclosure (CVD). He has over 30 years of hands-on security experience, stretching from in-band telephony switching to modern ICS/OT implementations. He has held IT ops, security, software engineering, and management positions in large organizations such as the US Government, Rapid7, 3Com, Dell, and Westinghouse, as both an offensive and defensive practitioner. Tod is a CVE Board member, has authored several research papers, and is an internationally-tolerated horror fiction expert.

More about todb

Written by Matthew Kienow

Matthew Kienow is a software engineer and security researcher. Matthew previously worked on the Recog recognition framework, AttackerKB as well as Metasploit's MSF 5 APIs. He has also designed, built, and successfully deployed many secure software solutions; however, often he enjoys breaking them instead. He has presented his research at various security conferences including DerbyCon, Hack In Paris, and CarolinaCon. His research has been cited by CSO, Threatpost and SC Magazine.

More about Matthew Kienow
Subscribe Now

Get the latest news and expert insights delivered in your inbox.

Welcome to the club! Your subscription to our newsletter is successful.

See Results in Minutes

See & secure your total attack surface. Even the unknowns & unmanageable.