Are MultiTech's Arm-based rCells, Conduits, OCGs, or Wireless Converters vulnerable to Spectre/Meltdown (Side-Channel Attacks)?

--PROBLEM--
Some processors, microprocessors, or microcontrollers are vulnerable to the following attacks:
* Variant 1: Bounds check bypass (CVE-2017-5753 aka Spectre - https://nvd.nist.gov/vuln/detail/CVE-2017-5753 )
* Variant 2: Branch target injection (CVE-2017-5715 aka Spectre - https://nvd.nist.gov/vuln/detail/CVE-2017-5715 )
* Variant 3: Rogue data cache load (CVE-2017-5754 aka Meltdown - https://nvd.nist.gov/vuln/detail/CVE-2017-5754 )


--PRODUCTS IN QUESTION--
MT100EOCG-x (MT100EOCG, MT100EOCG-EV2, MT100EOCG-EV3, MT100EOCG-G2, MT100EOCG-H4, MT100EOCG-H5, MT100EOCG-LAT1, MT100EOCG-LVW2)
MT200A2E-x  (MT200A2E)
MT200A2EW-x (MT200A2EW-H5)
MT200B2E-x  (MT200B2E)
MT200B2EW-x (MT200B2EW)
MTCAP-x     (MTCAP, MTCAP-LEU1, MTCAP-LNA3)
MTCBA-x-EN2 (MTCBA-C1-EN2, MTCBA-E-EN2, MTCBA-E1-EN2, MTCBA-EV2-EN2, MTCBA-EV3-EN2, MTCBA-G2-EN2, MTCBA-H-EN2, MTCBA-H4-EN2, MTCBA-H5-EN2)
MTCBA-X-EN3 (MTCBA-H3-EN3)
MTCDP-x     (MTCDP, MTCDP-E1, MTCDP-EV2, MTCDP-EV3, MTCDP-G2, MTCDP-H4, MTCDP-H5, MTCDP-LAT1, MTCDP-LVW2)
MTCDT-x     (MTCDT, MTCDT-H5, MTCDT-LAT1, MTCDT-LDC3, MTCDT-LEU1, MTCDT-LVW2)
MTCDTIP-x   (MTCDTIP, MTCDTIP-H5, MTCDTIP-LAT1, MTCDTIP-LDC3, MTCDTIP-LEU1, MTCDTIP-LVW2)
MTR-x       (MTR-C2, MTR-EV3, MTR-EV3, MTR-G3, MTR-H5, MTR-H6, MTR-LAT1, MTR-LEU1, MTR-LVW2)
MTRE-x      (MTRE-H5, MTRE-LAT1, MTRE-LVW2)


--ANALYSIS--
The above products utilize the ARM926EJ-S microprocessor core (architecture v5TEJ) from Arm. According to Arm, "The majority of Arm processors are not impacted by any variation of this side-channel speculation mechanism." The list of vulnerable Arm products given on Arm's vulnerability page ARE NOT utilized by any of MultiTech's products:
--> https://developer.arm.com/support/security-update


--RESOLUTION--
None of MultiTech's Arm-based products (as of January 18, 2018) are vulnerable to the Spectre/Meltdown attacks.