I can’t speak to answering your question directly. I would suggest that you write Framework customer support and ask your question there.
However, as with most of these vulnerabilities this one is something that the average user doesn’t need to stress about, provided they follow normal safe computing guidelines.
Primarily that they keep their computer within their control at all times (or at least reasonably so), and that they do not frequent illegitimate websites or use malicious content. (use software from legitimate sources, etc.)
Doing these two things will ensure that you are not likely to face an issue due to this problem.
And for a little more security password protect your bios.
That said, I’m sure that once changes are pushed to Framework’s bios vendor these vulnerabilities will be patched.
Um, I agree in general that many people don’t have a threat model that requires physical security or a Secure Boot root of trust. On the other hand, many people have good reasons for adopting a different threat model - or they want to use their computer in a work environment which has a policy around this.
Most laptop vendors patch Secure Boot compromises promptly and will make use of vendor coordinated disclosure where possible (as was the case here).
The researcher followed a co-ordinated disclosure process with Insyde so patches were already available to Insyde customers (presumably including Framework) before this vulnerability was publicly disclosed.
What I’d hoped to see from Framework was an indicative timeline or policy for integrating security fixes from upstream, rather than a vague list of security “best practices”.
I wonder if business clients are keeping track of BIOS vulnerability resolution timeline as one of the KPIs to evaluate Framework suitability for their company.
I would like to see this thread focuses on the subject of the CVE-2025-4275 written in the thread title. The linked page is about different security issue, right? I hope you create a new thread with the link if you want to discuss that topic.