Collectively called as BlueBorne, the exploits work for phones and computers, as well as IoT devices. It affects a variety of operating systems including Android, iOS, Windows, and Linux etc. “Armis believes many more vulnerabilities await discovery in the various platforms using Bluetooth, These vulnerabilities are fully operational, and can be successfully exploited.
The BlueBorne attack vector can be used to conduct a large range of offenses, including remote code execution as well as Man-in-The-Middle attacks.
The worst part, is that your Bluetooth connection just needs to be active, it doesn’t need to be paired to the attacker’s device. Also, because it effectively spreads “through the air”, BlueBorne is also classified as highly infectious malware, and can even infiltrate air gaped systems, as long as they have active Bluetooth.