Usually not, but I can imagine some edge cases where it might matter.
As another comment mentions, some vendors provide interfaces all the way into userspace (reachable by normal programs and malware) to edit the bios config, those can be secured with a password.
Other answer:
The only way to interact with the BIOS in order to use the password is to be physically at the computer.
I would argue that the only way to interact is through a HID. But to interact with an existing HID (or even emulate a new one) you don't need to be physically anywhere near it. See keystroke injection in wireless keyboards:
https://github.com/BastilleResearch/mousejack
A few Asus motherboards support cold boot from ps2, with usb to ps2 adapters still being used or Wake on Lan this becomes a practical remote attack. You could get a machine out of a powered-down state, and blindly enter the bios because of the predictable timing at boot.
Access to the BIOS could then be a way to set the system to boot from the network, bypassing the security model of the OS.
A properly used BIOS password would probably prevent that.