Compromise one device, extract the private key, have a "trusted for a very long time" cert that identifies like devices of that type, sneak it into a target network for man in the middle shenanigans.
If someone does that you’ve already been pwned. In reality you limit the CA to be ___domain scoped. I don’t know why ___domain-scoped CAs aren’t a thing.