Apple iOS before 8 enables Bluetooth during all upgrade actions, which makes it easier for remote attackers to bypass intended access restrictions via a Bluetooth session.
https://exchange.xforce.ibmcloud.com/vulnerabilities/96089
http://www.securitytracker.com/id/1030866
http://www.securityfocus.com/bid/69943
http://www.securityfocus.com/bid/69882
http://support.apple.com/kb/HT6441
http://archives.neohapsis.com/archives/bugtraq/2014-09/0106.html