From Trezor's response, this has been known about since October of last year (although they apparently just responded now).
The Ledger team released details of probably the same attack in July of last year. Certainly the attack they performed has the same outcome - if someone has physical access to your device they can extract the seed. See Lucius' link above. I own a Trezor device, but have since reset it, don't store any coins on it, and haven't used it at all, since a few weeks after that release. I was concerned about the attack, and I was also concerned about Trezor's response, which was essentially "Meh, use a passphrase", and didn't state in any way how they were going to address the issue (and they still haven't).
So that tells me that it isn't always possible to hack the Trezor if someone has possession of it. Someone please correct me if I've interpreted that incorrectly.
So the attack is always possible regardless of whether or not you use a passphrase. An attacker using this method will always be able to extract your 24 word seed. The different is whether or not your coins are also secured by a passphrase. If they aren't, then once an attacker has your seed they can steal your coins. If they are, then once an attacker has your seed they can try to brute force your passphrase, and then steal your coins.
In practice only an electronic engineer in a laboratory with the necessary equipment is able to conduct this attack.
Quite the opposite. The Ledger release above shows the attack was possible using a single board with components costing less than $100, using only "basic electronics techniques". Not only is this attack potentially easily reproducible, but someone could also manufacture and sell those boards.
For a passphrase to be as secure as a 24 word seed phrase, which is the security level you have to reach if you want your wallet to be as secure as if this attack didn't exist, then it needs to be 37 random characters. Given that only a minority of users even use a passphrase, and of those who do, a very small minority of them will use a passphrase of 37 random characters, Trezor's response to this attack is wholly unsatisfactory. Since most passphrases in use are probably human generated, then like passwords, they will be short, not random, and bruteforcible.