Much better than I initially thought from hearing "restore itself after a reboot and pick up right where it left off."
Stuff like that is a real boon for remote support, but it's rarely clear how much autonomous action such a loophole is capable of. Until someone with pure malicious intent uses it to add machines to a botnet or whatever.
Along the lines of the rootkits that Intel has been installing in just about every x86 processor for the past 10 years or so. You know, that fancy little feature "for data centre admins", to automatically power on, update, intercept KB/Mouse/Net, etc.
Perfectly safe of course. Really.