So then you read this bullet point
A device infected with this level of persistent malware basically needs to be thrown away rather than repaired.
If you know something CISA doesn’t please let them know.
Well if you condense everything down to a statement that says 'Basically', then 'basically' you might as well toss any monitors connected to the infected PC/device via USB or Displayport connectors, network switches/routers... basically anything that might have communicated with it over a packet interface that has programmable firmware...
It's a generalised statement which may well be true for some devices where the integrated firmware is stored within microcontrollers that may be too hard to replace. Arguably something could exploit the UEFI vulnerability to deploy payloads to other integrated devices such as firmware of an SSD (the most likely concern), the LAN chip, etc., but that would be reliant upon a vulnerability existing within that potential configuration - most UEFI systems use UEFI software modules loaded into the BIOS image to control LAN chips for PXE boot, etc., and SSDs are easily replaced, and with the current generation of systems SSDs are cheaper than some mediocre motherboards.
BUT, in reality, the odds are good that a majority of normal motherboards could be salvaged by replacing a chip (or two with dual-BIOS) which contains pretty much all the UEFI data. Thanks to fTPM, there isn't even a TPM chip that could be vulnerable - you get to clear both the UEFI and fTPM persistant storage areas in one hit.
Again, for sure governments would errr on the side of caution and have the resources to send a whole office block of devices to the dump and replace them all, which is who CISA guidance is primarily aimed at.
Nah, just get out a ch341a and a cheap SOIC8 clip.
Of course, I know what I am doing. Most won't. So valid.
How much do you charge...?