Unconvilized attackers can get ROOT access
ROOT user, also known as the superuser, possesses extensive privileges and complete control over a system’s functions and files, including the ability to install and remove software, modify system settings, and create, alter, or delete files across the entire system.
While Root access can offer experienced users and developers enhanced flexibility and control over their devices, it also carries inherent risks. In the event of incorrect modifications or the clandestine installation of malicious software, the device may be compromised, leading to potential damage or breaches of security.
/Reports, release notes, official announcements.