Are MultiTech's eCell or rCell 500 vulnerable to Spectre/Meltdown (Side-Channel Attacks)?

--PROBLEM--
Some processors, microprocessors, or microcontrollers are vulnerable to the following attacks:
* Variant 1: Bounds check bypass (CVE-2017-5753 aka Spectre - https://nvd.nist.gov/vuln/detail/CVE-2017-5753 )
* Variant 2: Branch target injection (CVE-2017-5715 aka Spectre - https://nvd.nist.gov/vuln/detail/CVE-2017-5715 )
* Variant 3: Rogue data cache load (CVE-2017-5754 aka Meltdown - https://nvd.nist.gov/vuln/detail/CVE-2017-5754 )


--PRODUCTS IN QUESTION--
MTR5-x  (MTR5-LAT4, MTR5-LEU2)
MTE-x   (MTE-LAT2)


--ANALYSIS--
MIPs indicated the following, "Advance notice regarding security vulnerabilities on processors with speculative execution was provided several months ago to MIPS. After investigation, it was determined that MIPS-designed cores in the highly popular M- and I-class product lines are not impacted by these exploitation techniques. This also extends to all previous generations of MIPS-designed cores that fall under our lineup of legacy cores."

MultiTech's eCell and rCell 500 products use legacy MIPs cores, so they are not impacted by this vulnerability.


--RESOLUTION--
None of MultiTech's eCell or rCell 500 products (as of January 19, 2018) are vulnerable to the Spectre/Meltdown attacks.