it is ... if they are after your bank account for example.
To take advantage of the vulnerability, they already need to have stolen your key. The key that is your form of 2FA. They already have everything they need at that point, assuming they also have your login information (and without that, the key itself would be useless).
This vulnerability only allows them to duplicate the key, using expensive hardware, highly specific technical expertise, and at least a day's worth of time. There is absolutely no reason to go through all that if they just want access to your bank account, since they would already have the key, and therefore access to your bank account.
The only scenarios in which this would be useful is those in which you covertly duplicate the key without the target realizing it happened, which would involve stealing the key, disassembling the key (which you can't really do non-destructively), spending a day to get access to it so you can clone it, then somehow reassembling it into its original state and returning it to its original location without anyone noticing anything happened.
And even then, it wouldn't be useful for robbing your bank account, since you would immediately notice something is wrong, and deauthorize the key; they could achieve the exact same thing with the original one. So the only actions it would be beneficial for is ones the target won't realize are happening, which would mainly be espionage, specifically long term access to confidential data via the target's accounts.
It's still not a good thing, but it only presents an increased risk for those in very specific circumstances.