An authentication bypass in the Bluetooth Low Energy (BLE) protocol could enable physically proximate attackers to impersonate trusted bluetooth devices. External references: https://www.usenix.org/system/files/woot20-paper-wu-updated.pdf
Statement: The research paper describes that Bluetooth Low Energy connections managed through `bluetoothctl` control or via D-Bus API are not vulnerable to this attack as they strictly follow the proactive authentication specification. Connections that are managed by `gatttool` are among those that may be vulnerable.
Mitigation: Bluetooth Low Energy can be disabled altogether if it is not required, using the configuration below. This will prevent BLE devices from connecting with the host, disabling this attack ```ControllerMode=bredr```
Created bluez tracking bugs for this issue: Affects: fedora-all [bug 1882204]