Blurtooth vulnerability?

Are there any statements or information from nuki.io about “Blurtooth” vulnerability?

Nuki uses its own encryption mechanism and does not rely on the BLE encryption which the BLURtooth vulnerability targets.