I didn't find anything in the way of guidance when Gigabyte, who made the motherboard in this PC, added a new note to the latest BIOS version they offer for my motherboard:
Major vulnerabilities updates, customers are strongly encouraged to update to this release at the earliest.
Credits to "Assaf Carlsbad and Itai Liba from SentinelOne"
I did find mention of something similar regarding a new Asus BIOS version for one of their motherboards, but that was it. Now Binarly, a security company specializing in firmware, has released documentation concerning several UEFI BIOS vulnerabilities that were introduced by the SDK [Software Development Kit] used by many devs to write UEFI BIOS. From reading their post I believe that those vulnerabilities, which were present in many well known brands, e.g. HP, have been patched since their discovery in Sept. 2021. Sadly that doesn't mean consumers were alerted by those manufacturers, perhaps because they feared a backlash from customers whose PCs/laptops did not get a BIOS update. I have not seen anything more specific about these UEFI BIOS vulnerabilities, and at least some [most? All?] manufacturers haven't published any details.
insyde[.]com/press_news/press-releases/insyde%C2%AE-software-credits-binarly%E2%80%99s-ai-powered-firmware-threat-detection
binarly[.]io/posts/An_In_Depth_Look_at_the_23_High_Impact_Vulnerabilities/index.html
Exploits targeting UEFI BIOS are not nearly as common as other paths to infection used by cyber criminals -- BIOS exploits are more difficult to develop then say phishing campaigns. But cyber crime is such a huge biz nowadays that many crews are now offering their work as a service, sort of a franchise biz model where anyone can take part, usually by promising a portion of their future ill gotten gains as payment. There's little reason to think that BIOS exploits won't become a feature of these new malware as a service offerings in the future.