Still. Imagine the following scenario: your son's machine is compromised because of said exploits. It's in the same network as your other systems. The attacker can now sniff all traffic, attack other systems. Do you have good network segmentation in place?
Who only uses their machine explicitely for gaming?