The BLE provisioning process is not secure against monster-in-the-middle attack. This can be solved without needing the device to have a display by having a static secret key on the device (preferably, though not necessarily, in a secure element) that has the corresponding public key printed on the device (in a QR code).