Carlos,
What you explained is not promiscuous mode, since requires explicit device address, and what we asked was promiscuous mode as it stated on page #1439, BLUETOOTH LOW ENERGY MISCELLANEOUS CONTROL
(MISC_CTRL), 44.2.3.3.3 PHY CONTROL (PHY_CTRL), offset 25, PROMISCUOUS, "1b - all packet filtering except frame length checking (FrameLength >=5 and FrameLength <=127) is bypassed.", and page #1454, RECEIVE FRAME FILTER, offset 14, "1b - Provide Data Indication on all received packets under the same rules which apply in PROMISCUOUS mode.
This is what we asked confirmation about. I already escalated this question through Arrow, but it will be nice to have an answer directly from you.
On a software side, as long as we will have an access to registers via KW41Z Connectivity Software, we should be fine. BTW - sources for sniffer and not being able to provide - NXP is in a hardware business, why all of a sudden this "Broadcom" behavior? Who informed you about it? Is it an official response, or should I still try to reach NXP folks that we met at RSA 2017 in San-Francisco, and who assured us that everything is available (I believe it was your Global Segment Marketing Manager).
Cheers.