Perhaps the most remarkable thing about BlueBorne is that the device does not need to access the website, download files or even connect to another device to become a victim. Just turn on Bluetooth, the hacker can take control. All is done without the user knowing.
Armis also announced eight related zero-day vulnerabilities, four of which are said to be very important. List of affected devices is available on the company's website.https://www.armis.com/blueborne/#/devices Armis said they contacted big companies like Google, Microsoft, Apple, Samsung and Linux to get the coordination.