<p>The vulnerabilities described below were identified during an external security audit by <a href="https://www.radicallyopensecurity.com/">Radically Open Security</a>and disclosed responsibly to our team. We are not aware of these attacks being used against Tails users until now.</p>
<p>These vulnerabilities can only be exploited by a powerful attacker who has already exploited another vulnerability to take control of an application in Tails.</p>
In Tails 6.10 or earlier, an attacker who has already taken control of an application in Tails could then exploit a vulnerability in *Tails Upgrader* to install a malicious upgrade and permanently take control of your Tails.
In Tails 6.10 or earlier, an attacker who has already taken control of an application in Tails could then exploit vulnerabilities in other applications that might lead to deanonymization or the monitoring of browsing activity: