WiFi Protected Access III (WPA3) protocol was launched a year ago in an attempt to address technical shortcomings of the WPA2 protocol from the ground. In less than a year, security researchers Mathy Vanhoef and Eyal Ronen found several weaknesses (Dragonblood) in the early implementation of WPA3, allowing an attacker to recover WiFi passwords by abusing timing or cache-based side-channel leaks. WiFi Alliance released patches to address the issues and created security recommendations to mitigate the initial Dragonblood attacks.
Source: https://thehackernews.com/2019/08/hack-wpa3-wifi-password.html