The Bluetooth Core and Mesh Profile specifications define requirements needed by Bluetooth devices to communicate with each other. Vulnerabilities could enable attackers to launch MitM attacks while within wireless range of vulnerable devices. Android Open Source Project, Cisco, Intel, Red Hat, Microchip Technology, and Cradlepoint are among the vendors identified so far with products impacted by these security flaws. The vulnerabilities were discovered by researchers at the Agence nationale de la s..curit.. des syst..mes d’information (ANSSI)
Source: https://www.bleepingcomputer.com/news/security/bluetooth-flaws-allow-attackers-to-impersonate-legitimate-devices/

