Similar attacks were already possible by freezing the RAM modules and read these out on a unprotected computer to completely break open the security features from the first CPU. That method had a high failure rate and a lot of hardware/software complexity.
But now it is possible to do the same attack without resorting to all those physical tricks, only leaving the software complexity, which is very likely reduced to almost no software complexity once a few smart people write an efficient routine for it.
Apparently there is very little to expect from Intel regarding security in their i3/i5/i7 series of processors of the last 10 years.