1756-rm2 Firmware Download

0 views
Skip to first unread message

Favio Cassidy

unread,
Aug 4, 2024, 3:27:16 PM8/4/24
to styltaimaros
TheAllen-Bradley 1756-RM2 is a ControlLogix Redundancy Module. It requires a redundant system for a backup in case of main system failure. It has enhanced features with speeds of up to 1000 Mbps. When paired with 1756-L7x controllers in both chassis, it gives the best scan performance. For cross loading, the 1756-RM2 uses redundant fiber ports with no single point of failure. During channel switchover, the processing chassis remains synched while the scan time may encounter a delay of around 10 ms. It has enhanced safety features with interference-free diagnostics.

The 1756-RM2 redundancy module draws 1.16 A current at 5.1V DC and 3.4 mA at 24V DC. It has a maximum power dissipation of 6W and a thermal dissipation of 21 BTU/hr. It can be installed in any slot in a ControlLogix chassis. The 1756-RM2 weighs 0.64 lbs. and it has an open enclosure. For communication, it supports up to seven enhanced ControlNet and EtherNet/IP communication modules. For wiring, the 1756-RM2 supports 1756-RMC1, 1756-RMC3 and 1756-RMC10 cable with 1m, 3m and 10m lengths respectively.

The ControlLogix 5560 and ControlLogix 5570 series of controllers support the 1756-RM2 module. The redundant system must have following components: two 1756 chassis with the same number of slots, modules, and firmware versions, and two additional ControlNet nodes. The Redundancy Module Configuration tool, RSLinx 2.59.01 communication software, and RSLogix 5000 20.01.00 programming software are required to run the 1756-RM2.


Close Topics Topics Cybersecurity Best Practices Cyber Threats and Advisories Critical Infrastructure Security and Resilience Election Security Emergency Communications Industrial Control Systems Information and Communications Technology Supply Chain Security Partnerships and Collaboration Physical Security Risk Management How can we help? GovernmentEducational InstitutionsIndustryState, Local, Tribal, and TerritorialIndividuals and FamiliesSmall and Medium BusinessesFind Help LocallyFaith-Based CommunityExecutivesHigh-Risk Communities Spotlight Resources & Tools Resources & Tools All Resources & Tools Services Programs Resources Training Groups News & Events News & Events News Events Cybersecurity Alerts & Advisories Directives Request a CISA Speaker Congressional Testimony CISA Conferences CISA Live! Careers Careers Benefits & Perks HireVue Applicant Reasonable Accommodations Process Hiring Resume & Application Tips Students & Recent Graduates Veteran and Military Spouses Work @ CISA About About Culture Divisions & Offices Regions Leadership Doing Business with CISA Site Links Reporting Employee and Contractor Misconduct CISA GitHub CISA Central 2023 Year In Review Contact Us Free Cyber Services#protect2024Secure Our WorldShields UpReport A Cyber Issue


Where this vulnerability exists in the 1756 EN2* and 1756 EN3* products, it could allow a malicious user to perform remote code execution with persistence on the target system through maliciously crafted CIP messages. This includes the ability to modify, deny, and exfiltrate data passing through the device.


Where this vulnerability exists in the 1756-EN4* products, it could allow a malicious user to cause a denial-of-service condition by asserting the target system through maliciously crafted CIP messages.


Rockwell Automation has released the following versions to fix these vulnerabilities and can be addressed by performing a standard firmware update. Customers are strongly encouraged to implement the risk mitigations provided below and to the extent possible, to combine these with the security best practices to employ multiple strategies simultaneously.


** Rockwell Automation strongly recommends updating to signed firmware if possible. Once the module is updated to signed firmware (example 5.008 to 5.0029), it is not possible to revert to unsigned firmware versions.


Properly segment networks. Given a cyber actor would require network connectivity to the communication module to exploit the vulnerability, organizations should ensure ICS/SCADA networks are properly segmented within the process structure as well as from the Internet and other non-essential networks.


CISA also provides a section for control systems security recommended practices on the ICS webpage at cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.


Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.

3a8082e126
Reply all
Reply to author
Forward
0 new messages