This is part of the "Packet Sanity" protection in the "Inspection Settings" which are part of the Access Control policy and not Threat Prevention.
My initial take was that this is some kind of interprocess communication on the firewall using ephemeral ports that should have used the loopback/127.0.0.1 interface but used its own Mgmt interface instead. The protection presumably doesn't like that the TCP flags PSH and URG are set but there is no ACK flag set. It is not clear to me if this packet was originated by the firewall itself, or is some kind of spoofed packet coming in from the network. Perhaps others can chime in.
Gaia 4.18 (R82) Immersion Tips, Tricks, & Best Practices
Self-Guided Video Series Coming Soon