An issue was discovered on Broadcom Wi-Fi client devices. Specifically timed and handcrafted traffic can cause internal errors (related to state transitions) in a WLAN device that lead to improper layer 2 Wi-Fi encryption with a consequent possibility of information disclosure over the air for a discrete set of traffic, a different vulnerability than CVE-2019-9500, CVE-2019-9501, CVE-2019-9502, and CVE-2019-9503.
packetstormsecurity.com/files/156809/Broadcom-Wi-Fi-KR00K-Proof-Of-Concept.html
www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-003.txt
www.huawei.com/en/psirt/security-advisories/huawei-sa-20200527-01-wifi-en
www.huawei.com/en/psirt/security-notices/huawei-sn-20200228-01-kr00k-en
cert-portal.siemens.com/productcert/pdf/ssa-712518.pdf
psirt.global.sonicwall.com/vuln-detail/SNWLID-2020-0001
support.apple.com/kb/HT210721
support.apple.com/kb/HT210722
support.apple.com/kb/HT210788
tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200226-wi-fi-info-disclosure
us-cert.cisa.gov/ics/advisories/icsa-20-224-05
www.mist.com/documentation/mist-security-advisory-kr00k-attack-faq/
www.synology.com/security/advisory/Synology_SA_20_03