A low-privileged process on a vulnerable machine could allow data harvesting and DoS.
Source: Threadpost