These critical Bluetooth vulnerabilities allow hackers to impersonate legitimate devices
attackers can abuse vulnerabilities discovered in the bluetooth core and mesh profile specification to impersonate legitimate devices during pairing and launch man-in-the- middle