That would be crazy if there was any ability to inspect HTTPS traffic. That would mean someone could sit anywhere in the path between you and the server and place some "firewall" and be able to intercept your data. HTTPS is fundamentally designed to prevent this.
That's exactly what mid- and high-end firewalls do (usually requiring a subscription for the feature). They perform man in the middle attacks basically. The firewall is basically proxying the connection anytime it sees that there is an SSL/TLS setup. They re-encrypt the data after inspection and replace the SSL certificate with their own in some cases. Anti-malware software does the same when you enable HTTPS inspection. This is also how data loss prevention features work with encrypted traffic, preventing stuff from going OUT, as well as features that monitor traffic patterns or perform heuristics to watch for suspicious data that looks like connections to control servers and the like, beyond just known IPs. There is an obvious need for PHYSICAL security on your network to prevent someone installing a piece of hardware that would do this, as well as overall network security to prevent someone taking over routing to cause traffic to pass through a compromised host that might have malware performing this function. Anywhere in the networks between yours and the remote hosts is more difficult to compromise this way, though, so for example a backbone provider between your ISP and the other ISP can't decrypt and re-encrypt the traffic. This is the cert that I receive in the browser with NOD32:
Common Name (CN)
forums.tomshardware.com
Organization (O)
<Not Part Of Certificate>
Organizational Unit (OU)
<Not Part Of Certificate>
Issued By
Common Name (CN)
ESET SSL Filter CA
Organization (O)
ESET, spol. s r. o.
Organizational Unit (OU)
<Not Part Of Certificate>
Validity Period
Issued On
Saturday, November 23, 2024 at 10:42:31 PM
Expires On
Friday, February 21, 2025 at 10:42:30 PM
SHA-256 Fingerprints
Certificate
bc4dac6b84e3e2968ed7d30bf4e167129d42141d684ef416fa5redacted
Public Key
37b83fe40e6bc132bbb03f505d57bbafbd04e3fcf64355778aredacted
Even lower-end "business class" firewalls that only cost a few hundred dollars often have this capability, and have their own certificate authority built in that can generate the replacement certs, although it costs a good bit in subscription fees to enable the feature, and a low-end firewall takes a big throughput performance hit to do all that extra work. Anti-malware on your PC doesn't cause a noticeable hit with it unless you're on a system that is already very underpowered and overloaded.