This is part of the "Packet Sanity" protection in the "Inspection Settings" which are part of the Access Control policy and not Threat Prevention.
My initial take was that this is some kind of interprocess communication on the firewall using ephemeral ports that should have used the loopback/127.0.0.1 interface but used its own Mgmt interface instead. The protection presumably doesn't like that the TCP flags PSH and URG are set but there is no ACK flag set. It is not clear to me if this packet was originated by the firewall itself, or is some kind of spoofed packet coming in from the network. Perhaps others can chime in.
Attend my 60-minute "Be your Own TAC: Part Deux" Presentation
Exclusively at CPX 2025 Las Vegas Tuesday Feb 25th @ 1:00pm