This should be addressed to ensure potential vulnerabilities are identified because it indicates that the vulnerability scan was not able to access some resources or perform some actions that require higher privileges on the target system. This could result in missing or inaccurate findings, as some vulnerabilities may not be detected or verified.