No they can't, it's also down to the Bluetooth devices themselves to be patched not the phone.
Take the Pixel Buds Pro 2 listed, Google has patched, fixed the issue and pushed updated firmware:
https://support.google.com/googlepixelbuds/thread/402474752?hl=en&msgid=404162831
plywood And another question: if there were an unknown exploit via text message or phone call, would blocking unknown numbers/not stored contacts "block" this attack? I’m talking about the feature you can set in the dialer.
I believe you maybe found some concern over this due to maybe hearing about things like Silent SMS etc.
A silent SMS is simply an SMS without content. You can send a silent SMS yourself. It's not an attack.
Trusting networks is a bad idea in general and should be avoided in the first place. You should use encrypted calls and texts rather than trusting carriers and other parties.
Cellular protocols are however becoming more secure to the point that disabling older protocol versions, null ciphers, etc. can provide a properly secure connection to the infrastructure but that doesn't mean it makes sense to trust your carrier, other carriers and other parties with it.
Silent SMS is simply an SMS without content. You can send them yourself. It's not an attack. There is nothing specific which needs to be done to defend against an SMS without content. It's the same set of defenses against exploitation for an SMS with content. It's not different.
The standard defences against exploitation combined with https://grapheneos.org/features#exploit-protection which gives an overview of the defences added by GrapheneOS. Silent SMS doesn't present a special attack vector beyond regular non-silent SMS. They're simply SMS messages without content to show.
The OS protects the device from known knowns, known unknowns but no system is entirely invulnerable. Yet discussing unknown unknowns and hypotheticals isn't often a productive or worthwhile discussion. The cellular systems are widely used and have a lot of scrutiny, it would take a special adversary to be able to use their protocols to impact a GrapheneOS device.