Malicious actors could potentially exploit this vulnerability if they gain physical access to a user's device.