The vulnerability can be exploited to reveal limited traffic data including a device’s IP address.
Source: Threadpost