BLURtooth vulnerability lets attackers overwrite Bluetooth authentication keys | ZDNet
All units using the Bluetooth standard 4. by way of 5. are vulnerable. Patches not promptly obtainable.
All units using the Bluetooth standard 4. by way of 5. are vulnerable. Patches not promptly obtainable.