Yes, but even if they do that, only some subset of cMP users will get the firmware--maybe only 50% or even less. Mojave updates delivered through the built-in update mechanism install without requiring a firmware update (I don't know if Apple can change that, or if they would if they can). Pretty much the only way to force a firmware update would be with macOS 10.15.
I bet Apple really regrets the firmware update mechanism they implemented for the cMP. When it comes to mitigating huge vulnerabilities like this, they can hardly impose it even if they want to since the procedure to perform the upgrade requires manual intervention by the end user (and oftentimes doesn't work even if the user follows the procedure). All other currently supported Macs have transparent, automatic fw updates.
Yet another reason I think Apple may kill off the venerable old cheese grater this year. Up until this vulnerability was discovered/disclosed I was very bullish on the cMP making the cut for one final year of macOS updates. But with the current situation I think the chances are quite high that they put it out to pasture for good.
I wonder if there is any route for end users to persuade Intel to change their mind about updating microcode for Westmere. Not just cMP users but there are lots of workstations and servers still in use with those CPUs. Not only that, but from what I've read, disabling HT on those processors doesn't fully address the problem since AES-NI is another vector and to my knowledge all Westmere CPUs incorporate AES-NI.