There are weak keys in the sense that their use by foisting chosen plaintexts can be proved, which could be interesting for chip cards with a ‘burnt-in key’. First of all, however, these keys can be easily avoided—one only needs to XOR all subkeys with the hexadecimal number 0x0dae—and second, the probability that such a key can be caught is 2−96; that is about one out of 1029 randomly selected keys (this number even has a name: 100 quadrilliards).
2007, Reinhard Wobst, “Life After DES: New Methods, New Attacks”, in Angelika Shafir, transl., Cryptology Unlocked, John Wiley & Sons, Ltd, section 3 (IDEA: A Special-Class Algoritmh), subsection 5 (Cryptanalyzing IDEA), page 239