To my understanding it's still hard to exploit this to steal information / break access / etc just because you'd need to know where the right bits were.
On the other hand, if all we want to do is break our adversary's process / crash it / make it perform arbitrary incorrect behavior, this seems substantially easier to accomplish even if we have no idea at all which bits we are flipping.