While it may not be misissuance, I don’t know if this provides a significant level of reassurance.
For example, there have been repeated discussions in the CA/B Forum about allowing CAs to be permanently delegated to (e.g. via CNAME). This would make such an issue like this functionally equivalent to compromising validation for those domains, and so benefits from a greater degree of public postmortem and incident response.
Even ignoring this, it doesn’t address, for example, whether they allow accounts to reuse cached/past validations, which could have a similar impact today, without changes to the BRs.
Given the quality of Netlock’s past incident reports, it seems reasonable to be concerned, and to hope for a full and public transparent incident report that can build confidence that Netlock truly has considered the edge cases, to examine not only how the incident happened, but how it was detected and should have been prevented.
If you recall, DigiNotar was arguably exemplary in their network design, which was strongly separated and tightly controlled to limit data flow, and that incident still happened - and DigiNotar failed to adequately detect.