Are MultiTech's Arm-based FaxFinders or SMSFinders (iSMS) vulnerable to Spectre/Meltdown (Side-Channel Attacks)?

Some processors, microprocessors, or microcontrollers are vulnerable to the following attacks:
* Variant 1: Bounds check bypass (CVE-2017-5753 aka Spectre - )
* Variant 2: Branch target injection (CVE-2017-5715 aka Spectre - )
* Variant 3: Rogue data cache load (CVE-2017-5754 aka Meltdown - )

FFx20-x (FF120, FF220, FF420, FF820)
FFx30-x (FF130, FF230, FF430, FF830)
SFx00-x (SF100, SF400, SF800)

NOTE: The FFx40 series of FaxFinders use an Intel processor. See

The above products utilize an ARM Version V5TE-Compliant Architecture. According to Arm, "The majority of Arm processors are not impacted by any variation of this side-channel speculation mechanism." The list of vulnerable Arm products given on Arm's vulnerability page ARE NOT utilized by any of MultiTech's products:

None of MultiTech's Arm-based products (as of January 18, 2018) are vulnerable to the Spectre/Meltdown attacks.