Phison has publicly acknowledged and replicated a key finding first raised by the PCDIY community: a wave of disappearing and allegedly “bricked” NVMe SSDs linked in timing to Windows 11’s August cumulative update (KB5063878) appears to have been driven, in at least some test cases, by pre‑release engineering firmware installed on development or non‑retail units — not by the retail firmware shipping on consumer drives. This admission shifts the narrative from a platform‑wide Windows regression to a narrower supply‑chain and firmware‑provenance problem, but it leaves several important questions about disclosure, remediation, and data‑loss risk unanswered.
In mid‑August 2025 Microsoft shipped the Windows 11 24H2 August cumulative update commonly tracked as KB5063878 (OS Build 26100.4946). Within days, hobbyist labs and several specialist outlets documented a reproducible failure profile: during sustained large sequential writes (often in the neighborhood of ~50 GB or more) some NVMe SSDs would temporarily disappear from Windows, stop responding to vendor tools, and in some cases return with corrupted or RAW partitions. This pattern was repeatedly observed on drives that were partially filled and under heavy write stress. Phison — a major NAND controller vendor whose silicon appears in many consumer NVMe products — initially investigated the reports and later published a substantial validation report saying it had run more than 4,500 cumulative testing hours and 2,200+ test cycles across the reported device set and could not reproduce a systemic failure on production firmware. Microsoft also reported no telemetry‑based link between KB5063878 and a spike in disk failures across its fleet. Those two public positions initially framed the incident as either rare hardware coincidence or a narrowly scoped configuration problem. (pcgamer.com)
Despite those vendor statements, community test benches continued to publish reproducible recipes. A DIY PC group (PCDIY) noted that drives used in their stress tests were running engineering preview firmware — a class of pre‑release firmware builds intended for validation and not meant for retail use — and that only those engineering builds failed under the Windows workload, while units on confirmed production images did not. Phison followed up, stating it had examined the exact SSDs used in PCDIY’s testing, confirmed the presence of pre‑release engineering firmware on those units, and replicated the stress tests on consumer‑available drives without reproducing the failures. Phison also said it could reproduce the failure when using the non‑retail engineering firmware.
If engineering firmware inadvertently reaches retail units — through mis‑flashed production lines, preconfigured evaluation units, or supply‑chain crossover — a host change (like a Windows update that subtly alters I/O timing or buffering) can expose those latent bugs. That explains why vendor lab programs that test production images at scale might not see failures while hobbyist benches using a mixed pool of hardware could reproduce them consistently.
Background / Overview
In mid‑August 2025 Microsoft shipped the Windows 11 24H2 August cumulative update commonly tracked as KB5063878 (OS Build 26100.4946). Within days, hobbyist labs and several specialist outlets documented a reproducible failure profile: during sustained large sequential writes (often in the neighborhood of ~50 GB or more) some NVMe SSDs would temporarily disappear from Windows, stop responding to vendor tools, and in some cases return with corrupted or RAW partitions. This pattern was repeatedly observed on drives that were partially filled and under heavy write stress. Phison — a major NAND controller vendor whose silicon appears in many consumer NVMe products — initially investigated the reports and later published a substantial validation report saying it had run more than 4,500 cumulative testing hours and 2,200+ test cycles across the reported device set and could not reproduce a systemic failure on production firmware. Microsoft also reported no telemetry‑based link between KB5063878 and a spike in disk failures across its fleet. Those two public positions initially framed the incident as either rare hardware coincidence or a narrowly scoped configuration problem. (pcgamer.com)Despite those vendor statements, community test benches continued to publish reproducible recipes. A DIY PC group (PCDIY) noted that drives used in their stress tests were running engineering preview firmware — a class of pre‑release firmware builds intended for validation and not meant for retail use — and that only those engineering builds failed under the Windows workload, while units on confirmed production images did not. Phison followed up, stating it had examined the exact SSDs used in PCDIY’s testing, confirmed the presence of pre‑release engineering firmware on those units, and replicated the stress tests on consumer‑available drives without reproducing the failures. Phison also said it could reproduce the failure when using the non‑retail engineering firmware.
What exactly happened: the technical fingerprint
Symptoms observed in the wild and in labs
- Drives vanish from File Explorer, Device Manager, and Disk Management while a large write is in progress.
- Vendor diagnostic tools and SMART readers sometimes fail to query the device after the event.
- Reboots occasionally restore device visibility; in other cases the drive remains unreadable or returns corrupted partitions.
- The reproducible trigger that community labs used was a sustained sequential write, typically tens of gigabytes in one continuous operation, on drives already partially used (>50–60% capacity).
Why firmware provenance matters
SSD firmware controls critical behaviors: command handling, mapping tables, garbage collection, thermal throttling, and interactions with Host Memory Buffer (HMB) where applicable. Engineering or pre‑release firmware images commonly include diagnostic hooks, un‑hardened code paths, and performance instrumentation — exactly the sort of differences that can reveal latent bugs under unusual host timing or workload patterns.If engineering firmware inadvertently reaches retail units — through mis‑flashed production lines, preconfigured evaluation units, or supply‑chain crossover — a host change (like a Windows update that subtly alters I/O timing or buffering) can expose those latent bugs. That explains why vendor lab programs that test production images at scale might not see failures while hobbyist benches using a mixed pool of hardware could reproduce them consistently.
Phison’s investigation and lab findings — what’s verified
- Phison publicly described a large validation program (4,500+ hours and 2,200+ cycles) and said it could not reproduce the reported disappearance/crash pattern on production firmware images. Multiple independent outlets reported this figure and Phison’s inability to reproduce at scale. (pcgamer.com)
- After being contacted by PCDIY, Phison said it examined the exact drives used in those tests, found those units were running engineering preview firmware, and replicated the community stress tests on retail consumer drives without failures. Phison also reproduced failures on those same models when they were flashed with the engineering firmware image. That strongly suggests a firmware‑image provenance issue, not a universal Windows regression.
- Phison additionally recommended standard best practices — thermal mitigation for high‑performance drives and coordination with OEM partners — while continuing to monitor partner telemetry. (guru3d.com)

