KRACK has multiple CVE vulnerabilities associated with it. Patch everything, especially devices, access points, and notably android . The best article for overall information out there will be on krebsonsecurity.com ...this has some really good, well written information
https://krebsonsecurity.com/2017/10/what-you-should-know-about-the-krack-wifi-security-weakness/ This is from US CERT on KRACK
The following CVE IDs have been assigned to document these vulnerabilities in the WPA2 protocol:
CVE-2017-13077: reinstallation of the pairwise key in the Four-way handshake
CVE-2017-13078: reinstallation of the group key in the Four-way handshake
CVE-2017-13079: reinstallation of the integrity group key in the Four-way handshake
CVE-2017-13080: reinstallation of the group key in the Group Key handshake
CVE-2017-13081: reinstallation of the integrity group key in the Group Key handshake
CVE-2017-13082: accepting a retransmitted Fast BSS Transition Reassociation Request and reinstalling the pairwise key while processing it
CVE-2017-13084: reinstallation of the STK key in the PeerKey handshake
CVE-2017-13086: reinstallation of the Tunneled Direct-Link Setup (TDLS) PeerKey (TPK) key in the TDLS handshake
CVE-2017-13087: reinstallation of the group key (GTK) when processing a Wireless Network Management (WNM) Sleep Mode Response frame
CVE-2017-13088: reinstallation of the integrity group key (IGTK) when processing a Wireless Network Management (WNM) Sleep Mode Response frame
All of these weaknesses will start showing up in devices. Anything with a nic and an ip address essentially using wifi could be vulnerable. The only way to really know comprehensively is run a vulnerability scan and see what pops up...download a free copy of nessus vulnerability scanning software. IOT devices, your tv, refrigerator, nest camera system, will end up being vulnerable to this too...and many will never get patched.