it lies
(certainly with the date it was published!)
the key derivation function (PKCS12KDF) is the part that is non compliant for PKCS12. There is an open draft (expired) RFC to add PBKDF2 support but the standard only supports 2 non compliant ways today.
The KDF is used for integrity checking - and if you do not do integrity checking its fine, but then FIPS you want integrity checking to prevent tampering (because FIPS)
https://github.com/openssl/openssl/issues/20427#issuecomment-1455286294
appears as though the draft is now ready (may 2024!) - but there are still issues.
1. the algorithms used need to come from a validated library for FIPS compliance.
2. the (stadard) JVM implementation appears to utilise its own providers in preference to anything configured in the JVM (ie it ignores BouncyCastle and will parse a PKCS12 and not error - the older versions are certainly not using that updated KDF!)
3. This has not evloved into Bouncycastle (or the FIPS version) yet to use a BC-FIPS variety.
https://downloads.bouncycastle.org/fips-java/docs/BC-FJA-UserGuide-1.0.2.pdf sec 7
What makes PKCS#12 not compliant? This seems to indicate that it can be: https://davidscode.com/blog/2022/02/15/generating-fips-compliant-pkcs12-files-with-openssl/