It certainly doesn't match the magnitude of the information concerning what they use those tools for; but it's an area of concern(and interest, if one is even peripherally involved or interested in the business or implementation of computer security) because this isn't the old days where 'military' or 'foreign' systems are some special category of bespoke hardware, almost totally separate from stuff everybody else uses and built to order:
Thanks to globalization and economies of scale, if you want to crack a switch, or a server, or some other widget, odds are very good that the toolkit you'd use (and the device you'd use it against) in the far corners of the earth will be virtually identical to the ones in homes, offices, and equipment racks right here.
BIOS/UEFI malware? Cross-platform compatibility in that sector is pretty dreadful, even between assorted x86 boards; but the entire world is basically covered by AMI, Phoenix, Insyde, and Intel, with AMD and various OEM-specific BIOS customizations licensed from the big players making up the difference.
HDD firmware attacks? There are basically three extant manufacturers, worldwide, with some oddities left over from comparatively recent deaths and mergers.
OS and application attacks aren't likely to be all that much more diverse.
Punchline is, if the NSA has something neat in the toolbox, it almost certainly works equally well on you, our good buddies, our less good buddies, and people we are currently shooting at. There is effectively zero diversity or political/cultural targeting with many core IT components.
Further, if the NSA has something neat in the toolbox, that means that one or more vulnerabilities that make that attack work are being deliberately hidden, possibly even deliberately encouraged, by the entity ostensibly responsible for American electronic security. Even if Uncle Sam doesn't come for you, pretty much every attack in the box represents one or more vulnerabilities that you and yours continue to suffer from because the NSA wants them to work more than it wants US vendors and users to be secure against any attacker who figures them out.
Even if you are 100% confident in the NSA's Good, Upstanding, Totally Patriotic, choice of targets, that's a pretty serious issue: the NSA is smarter than average; but the world is rife with other intelligence outfits(and merely economic malware and bot-herders), about whom you definitely should not be comfortable. Are you confident that the NSA's ability to read everybody's email is doing you enough good to counterbalance the fact that they are (deliberately) ignoring vulnerabilities in the products you use that they could be helping to fix?
It's that bit that is really where the second issue opens up.
Most of the Snowden leaks, as documented in the press so far, have been about 'Apparently the NSA considers the 4th amendment to cover thoughts that you don't think too loudly, and not much else.' and 'We in the US keep our enemies close and our friends closer still'.
These reports concerning technical capabilities and approaches emphasize that (far from being a general friend of security, as it turns out to have been in the 3DES days), the NSA is now actively unhelpful to the cause of system security worldwide, in the service of being able to crack more stuff. Even if you 100% trust their motives, and the goodness of their direct actions, that's still a pretty risky stance for them to be taking. Even if I think that what they do is great, and that privacy and diplomacy-related criticisms are nonsense, am I comfortable with the thesis that their ability to crack additional targets benefits me more than their assistance in making my systems less crackable would? Is America enough better off for being able to read foreign email to make up for being seen as a purveyor of deliberately toxic products?