|Affected hardware||Many devices with Broadcom and Cypress Semiconductor Wi-Fi chips including smartphones, tablets and single-board computers|
Kr00k (also written as KrØØk) is a security vulnerability that allows some WPA2 encrypted WiFi traffic to be decrypted. The vulnerability was originally discovered by security company ESET in 2019 and assigned CVE-2019-15126 on August 17, 2019. ESET estimates that this vulnerability affects over a billion devices.
The vulnerability is known to be patched in:
- iOS 13.2 and iPadOS 13.2 - October 28, 2019 
- macOS Catalina 10.15.1, Security Update 2019-001, and Security Update 2019-006 - October 29, 2019 
During their research, ESET confirmed over a dozen popular devices were vulnerable.
Known vulnerable devices include:
- Amazon Echo 2nd gen
- Amazon Kindle 8th gen
- Apple iPad mini 2
- Apple iPhone 6, 6S, 8, XR
- Apple MacBook Air Retina 13-inch 2018
- Asus wireless routers (RT-AC1200G+, RT-AC68U), but fixed in firmware Version 188.8.131.52.382.5161220 during March 2020
- Google Nexus 5
- Google Nexus 6
- Google Nexus 6P
- Raspberry Pi 3
- Samsung Galaxy S4 (GT-I9505)
- Samsung Galaxy S8
- Xiaomi Redmi 3S
- "A serious vulnerability deep inside Wi-Fi encryption | ESET". www.eset.com. Retrieved 2020-02-28.
- "Kr00K vulnerability affects devices with Broadcom and Cypress Wi-Fi chips". xda-developers. 2020-02-27. Retrieved 2020-02-28.
- https://www.welivesecurity.com/wp-content/uploads/2020/02/ESET_Kr00k.pdf[bare URL PDF]
- "Kr00k, KRACK, and the Seams in Wi-Fi, IoT Encryption". Dark Reading. 12 August 2020. Retrieved 2020-08-14.
- "KrØØk attack variants impact Qualcomm, MediaTek Wi-Fi chips". BleepingComputer. Retrieved 2020-08-07.
- "Beyond KrØØk: Even more Wi‑Fi chips vulnerable to eavesdropping". WeLiveSecurity. 2020-08-06. Retrieved 2020-08-07.
- Osborne, Charlie. "Cisco patches incoming to address Kr00k vulnerability impacting routers, firewall products". ZDNet. Retrieved 2020-02-28.
- "Wi-Fi Protected Network and Wi-Fi Protected Network 2 Information Disclosure Vulnerability". tools.cisco.com. Retrieved 2020-02-28.