CVE has low impact and therefore fix is deferred for the other (affected) components
Rocky has what RHEL has and therefore, openssl in Rocky is not affected and no fix is required.
Your “security scan” does not actually verify that component has/hasn’t vulnerability, nor it does know that the component in RHEL/Rocky differs from upstream.
The CVE-2025-32728 cve-details has moderate impact but Red Hat has deferred fix. They do describe a mitigation to avoid the issue for time being.
Rocky has what RHEL has and therefore Rocky will (most likely) not release a fixed version before RHEL has released one.