Are MultiTech's Arm-based FaxFinders or SMSFinders (iSMS) vulnerable to Spectre/Meltdown (Side-Channel Attacks)?

--PROBLEM--
Some processors, microprocessors, or microcontrollers are vulnerable to the following attacks:
* Variant 1: Bounds check bypass (CVE-2017-5753 aka Spectre - https://nvd.nist.gov/vuln/detail/CVE-2017-5753 )
* Variant 2: Branch target injection (CVE-2017-5715 aka Spectre - https://nvd.nist.gov/vuln/detail/CVE-2017-5715 )
* Variant 3: Rogue data cache load (CVE-2017-5754 aka Meltdown - https://nvd.nist.gov/vuln/detail/CVE-2017-5754 )


--PRODUCTS IN QUESTION--
FFx20-x (FF120, FF220, FF420, FF820)
FFx30-x (FF130, FF230, FF430, FF830)
SFx00-x (SF100, SF400, SF800)

NOTE: The FFx40 series of FaxFinders use an Intel processor. See https://support.multitech.com/support/case.html?action=view&id=86145


--ANALYSIS--
The above products utilize an ARM Version V5TE-Compliant Architecture. According to Arm, "The majority of Arm processors are not impacted by any variation of this side-channel speculation mechanism." The list of vulnerable Arm products given on Arm's vulnerability page ARE NOT utilized by any of MultiTech's products:
--> https://developer.arm.com/support/security-update


--RESOLUTION--
None of MultiTech's Arm-based products (as of January 18, 2018) are vulnerable to the Spectre/Meltdown attacks.