11th Apr 2002 [SBWID-5255]
COMMAND
	Cisco Aironet DoS via telnet
SYSTEMS AFFECTED
	 All releases up to, but excluding, 11.21 are vulnerable. The following
	 hardware products are affected :
	   * Cisco Aironet Access Point 340 and 350
	   * Cisco Aironet Bridge 350
PROBLEM
	In Cisco advisory
	 [http://www.cisco.com/warp/public/707/Aironet-Telnet.shtml] :
	It is possible to cause Cisco  Aironet  products  to  reboot  if  Telnet
	access is enabled and a password is  required  for  authorization.  This
	can be accomplished by providing an invalid username and password.
	By repeatedly  exploiting  this  vulnerability  an  attacker  can  cause
	denial of service.
SOLUTION
	The workaround for this vulnerability is to disable Telnet access.
	This vulnerability is fixed in release 11.21, which is available now.