Attackers could craft a campaign that makes use of the device profile in order to exploit any vulnerabilities in a targeted fashion.
Source: Threadpost