"The BlueBorne attack vector requires no user interaction, is compatible to all software versions, and does not require any preconditions or configurations aside of the Bluetooth being active. "

You know something is wrong with the software world when the only truly compatible pieces are the vulnerabilities.

lol, too true.