If root was
ever enabled without setting a password, the machine is then in a state that it can be remotely exploitable.
While it's unlikely, there are probably plenty of users who have done this for some reason or another.
Don't underestimate a user's ability to blindly do things like this by following arcane instructions in attempts to fix an unrelated problem.