An "authorized attacker" could exploit this weakness to gain elevated privileges, potentially reaching SYSTEM-level access.
You can share a keyboard and mouse across multiple Windows and macOS computers, if you know the right tools to use.