In this survey paper, we have presented a complete taxonomy of security and privacy issues of BLE. We have presented possible attack scenarios for different types of vulnerabilities, classified them according to their severity, and listed possible mitigation techniques.