These are devices at the edges of your network only connected by a few links. Vulnerabilities in the OS can allow these devices to become threats in your Attack Surface.