The BlueBorne vulnerability was announced on September 12, 2017. It's a family of attacks against several implementations of the Bluetooth protocol that enable full compromises of various Bluetooth stacks, including Linux BlueZ (including Android), iOS, and allows for MitM takeover of Windows network connections.
The discoverers at Armis claim that the vulnerabilities are so bad that they are fully "wormable"; and the evidence they've presented supports that assertion.
All the big manufacturers have been notified and patched their newer systems. However, the problems will remain in the smaller players, as well as all the existing embedded devices that have Bluetooth connectivity. These would include cars, activity trackers, headphones, TVs, selfie sticks, and every other ridiculous "we-jammed-Bluetooth-chips-in-there-because-we-are-so-IoT" device.
What options exist to help companies and people prevent this from spreading, as it is almost certain to? Can we build "worm detectors" to help prevent carriers from bringing infected devices into secure environments? Can we build "vulnerability testers" to constantly scan nearby devices, warning us when they encounter a device that needs to be replaced? What can we do to respond?