If I were on their infosec team I wouldn't ignore it, but also, infosec and network often different silos. If network was already notified, infosec can't do much but complain.
And, it seems the network was somewhat secure anyway. Any inbound scan or malicious traffic would get dropped going outbound, since there was no session on the outbound firewall.
There are lots of types of maliciousness that would not be affected by this.
That said, a proper firewall implementation would only allow traffic back to a source port that is in the routing table as having an established connection. But that’s a stateful firewall (vs. stateless) and comes with its own set of complexities.
You can configure a router to not use a path, even though that path physically exists.
Also usually firewalls are not decreasing packets IP TTL which make them invisble to traceroute.
You are lucky this one does not.