<p>The vulnerabilities described below were identified during an external security audit by <a href="https://www.radicallyopensecurity.com/">Radically Open Security</a> and disclosed responsibly to our team. We are not aware of these attacks being used against Tailsusers until now.</p>
<p>These vulnerabilities can only be exploited by a powerful attacker who has already exploited another vulnerability to take control of an application in Tails.</p>
<p>If you want to be extra careful and used Tails a lot since January 9 without upgrading, we recommend that you do a [[manual upgrade|upgrade/#manual]] instead of an automatic upgrade.</p>
In Tails 6.10 or earlier, an attacker who has already taken control of an application in Tails could then exploit a vulnerability in *Tails Upgrader* to install a malicious upgrade and permanently take control of your Tails.
In Tails 6.10 or earlier, an attacker who has already taken control of an application in Tails could then exploit vulnerabilities in other applications that might lead to deanonymization or the monitoring of browsing activity:
Sometimes, the partitions on a TailsUSB stick get corrupted. This creates errors with the Persistent Storage or during upgrades. Partitions can get corrupted because of broken or counterfeit hardware, software errors, or physically removing the USB stick while Tails is running.
Tails now warns about such partitioning errors earlier. For example, if partitioning errors are detected when there is no Persistent Storage, Tails recommends that you reinstall or use a new USB stick.