The offending rule firewalld_sshd_port_enabled is part of the cjis, ncp, rhelh-stig and rht-ccp profiles that are shipped in scap-security-guide-0.1.66-1.el7_9.noarch which is shipped in RHEL 7. Therefore, this bug currently affects the users of these profiles on RHEL 7. The impact is that the customers using these profiles will get invalid XML OVAL results, which is serious.
Correction of the previous item - the issue is serious only in the context of the mentioned profiles. Those profiles are, however, relatively low-profile. Other profiles than cjis, ncp, rhelh-stig and rht-ccp shipped in RHEL7 are also better in almost all aspects, and much popular as well. Given that and the risk-based approach to fixing issues in RHEL7, this fix doesn't qualify to being backported under the current conditions.