A wave of community test results and vendor confirmations this week has put the latest Windows 11 cumulative update under a harsh spotlight: several SSDs can disappear from Windows during sustained, large write operations after installing the August 12, 2025 update (KB5063878), with a non-trivial risk of truncated or corrupted files for data written during the failure window. (support.microsoft.com) (tomshardware.com)
Microsoft shipped the August 12, 2025 cumulative update for Windows 11 (24H2) as KB5063878 (OS Build 26100.4946) to deliver security and quality fixes. The official KB page lists the build and the general fixes but, at the time community testing began to surface, it did not list a storage-related known issue in the release notes. (support.microsoft.com)
Within days of the rollout, independent testers and consumer reports converged on a reproducible failure profile: during sustained sequential writes—commonly reported around the ~50 GB mark—some SSDs stop responding and may vanish from File Explorer, Device Manager and Disk Management. In many reproductions the drive becomes unreadable by vendor utilities and SMART telemetry, and files written during the incident are often truncated or corrupted. Reboots sometimes restore visibility but do not guarantee the integrity of newly written files. (tomshardware.com) (windowscentral.com)
Community collations and forum digests have provided early model lists and detailed symptom fingerprints; those datasets were central in elevating the issue from scattered forum posts to an industry‑level investigation. These community summaries also recommended immediate, practical mitigations (back up, avoid large writes, stage deployments) while vendors and Microsoft work toward a fix.
Practical takeaway on lists:
Pragmatically, the responsible posture for both consumers and IT administrators is clear and conservative: back up valuable data now, avoid sustained large writes on systems that received the update, verify firmware with vendors before applying risky workloads, and stage enterprise deployments. That approach minimizes the real but context-dependent risk of data corruption while allowing vendors and Microsoft time to deliver a tested remediation.
This incident is a stark reminder that modern storage reliability is a co-engineered property of OS, driver, controller firmware, BIOS/UEFI and workload. When any one of those components changes, latent edge-cases can surface with outsized consequences for data integrity. Until vendors publish validated fixes and Microsoft posts definitive guidance, the simplest and most reliable defense remains prudent backups and cautious I/O behavior.
Source: GB News Updating Windows 11 this weekend could cause the SSDs with ALL of your files to VANISH, PC owners warned
Background / Overview
Microsoft shipped the August 12, 2025 cumulative update for Windows 11 (24H2) as KB5063878 (OS Build 26100.4946) to deliver security and quality fixes. The official KB page lists the build and the general fixes but, at the time community testing began to surface, it did not list a storage-related known issue in the release notes. (support.microsoft.com)Within days of the rollout, independent testers and consumer reports converged on a reproducible failure profile: during sustained sequential writes—commonly reported around the ~50 GB mark—some SSDs stop responding and may vanish from File Explorer, Device Manager and Disk Management. In many reproductions the drive becomes unreadable by vendor utilities and SMART telemetry, and files written during the incident are often truncated or corrupted. Reboots sometimes restore visibility but do not guarantee the integrity of newly written files. (tomshardware.com) (windowscentral.com)
Community collations and forum digests have provided early model lists and detailed symptom fingerprints; those datasets were central in elevating the issue from scattered forum posts to an industry‑level investigation. These community summaries also recommended immediate, practical mitigations (back up, avoid large writes, stage deployments) while vendors and Microsoft work toward a fix.
What the reports show
Symptom profile: the consistent failure signature
- A large continuous write operation (game install, archive extraction, cloning, large backup) proceeds normally and then abruptly stalls or fails.
- The destination SSD becomes unresponsive and disappears from File Explorer, Disk Management and Device Manager.
- Vendor utilities and SMART readers may report unreadable telemetry or fail to query the device.
- Files written during the failure window are often incomplete, truncated, or corrupted.
- A reboot frequently restores the drive's visibility but does not restore any corrupted files and does not guarantee the fault will not recur. (tomshardware.com)
Typical trigger parameters identified in tests
Independent hands‑on tests and collations consistently reported two practical thresholds that increase risk:- Sustained writes in the order of 50 GB or more in a single session.
- Target drives that are already ~50–60% full or more, which reduces spare area and shrinks SLC-caching windows on many consumer SSDs.
Which drives and controllers are implicated (and how reliable the lists are)
Early public lists of affected drives include a range of consumer NVMe models from multiple vendors. Community collations and test benches repeatedly flagged devices that use Phison controllers—particularly some DRAM‑less variants—as disproportionately likely to exhibit the behaviour, but the phenomenon has not been confined to a single vendor or controller family. Reported models in public testing included drives from Corsair, SanDisk, Kioxia, ADATA, Kingston, WD and others. That said, not every drive of the same model or family reproduces the fault: firmware revision, assembly variant, platform BIOS/UEFI, and thermal conditions all influence outcomes. (tomshardware.com) (notebookcheck.net)Practical takeaway on lists:
- Treat early model lists as investigative leads, not final compatibility matrices. Firmware serials, assembly partners and platform settings matter.
- Manufacturers often publish or verify impact lists and firmware advisories only after engineering validation; community lists should be cross-checked against vendor advisories before acting.
What Microsoft and vendors have said so far
- Microsoft: the company acknowledged it is aware of reports and said it is investigating with partners, requesting affected users to file Feedback Hub reports and contact support where appropriate. Microsoft also stated internal telemetry had not shown a population-level increase in disk failures at the time of public inquiry. The official KB for KB5063878 did not initially list a storage-related known issue. (bleepingcomputer.com) (support.microsoft.com)
- Phison: the SSD controller vendor publicly confirmed it had been made aware of “industry‑wide effects” related to recent Windows updates (community reporting named KB5063878 and KB5062660) and said it was investigating and coordinating with partners. That confirmation from a major controller vendor elevated the issue beyond isolated forum anecdotes. (bleepingcomputer.com)
- Other vendors: SSD manufacturers and OEMs have been contacting customers through firmware utilities and support channels as investigations continue; responses ranged from advisories to avoid heavy writes to promises of targeted firmware updates if a controller-level defect is confirmed.
Technical analysis: what could be happening
This is an evolving forensic question. Community test benches and expert commentary point to several plausible technical mechanisms—none of which are yet fully proven in a published vendor post-mortem:- Controller lockup under sustained load: a bug in controller firmware can cause the drive to stop responding to NVMe commands under sustained, sequential writes. Without a graceful timeout, the host sees the device as gone and driver/OS calls fail. This matches the "disappear mid‑write" symptom.
- SLC cache exhaustion on near-full drives: consumer drives often use an SLC-mode cache to absorb bursts; if the cache is smaller because the drive is already filled, sustained writes can overrun the cache and expose latent firmware timing bugs. Community reports that the fault is more likely when drives are >~60% full support this hypothesis. (windowscentral.com)
- Host Memory Buffer (HMB) interactions: past Windows 11 storage regressions involved HMB allocation and DRAM‑less SSDs; any change in host-side allocation or timing can destabilize firmware that expects a particular host behaviour. While not every affected drive is DRAM‑less, the HMB axis remains a plausible interaction vector to investigate.
- OS storage stack timing/regression: Microsoft’s cumulative updates include servicing stack and storage-driver interactions. A subtle change in how Windows schedules or flushes writes could create a host timing environment that triggers a firmware corner-case. The fact that multiple controllers and vendors appear in reports suggests the issue may be a host–firmware interaction rather than a single firmware bug isolated to one controller family.
Immediate practical advice for Windows 11 users (what to do right now)
The conservative, defensible posture for users and administrators while this incident is investigated is simple and risk-focused: prioritize data and avoid actions that increase exposure.- Back up critical data now using the 3-2-1 rule: three copies, two media types (local + cloud or external), one off‑site. Hardware backups or verified cloud backups are essential before performing large writes. (windowscentral.com)
- Avoid sustained large writes on recently updated systems: do not install very large games, perform large archive extractions, clone drives, or run large backups against drives that have KB5063878 applied until vendors confirm the risk is mitigated. Community repros commonly used transfers of ~50 GB to reproduce the fault. (notebookcheck.net)
- Check SSD firmware and vendor advisories: run manufacturer utilities (not third‑party guessing tools) to verify installed firmware and to see if a vendor has issued a mitigation or patch. Do not apply firmware updates without a backup. (bleepingcomputer.com)
- If the update has not been installed: pause or defer non-critical Windows 11 cumulative updates on systems that must perform heavy I/O or contain irreplaceable data, using WSUS/SCCM or Windows Update for Business for managed fleets.
- If a drive disappears mid‑write: power down immediately, do not continue writes or reformat, and image the drive if the data is valuable. Collect Event Viewer and NVMe host logs, then contact vendor support for forensic guidance. Avoid repeated reboot-and-write cycles that may worsen metadata corruption.
- Back up critical files to an external drive or cloud immediately.
- Do not perform large, continuous file transfers (>50 GB) on drives with KB5063878 installed.
- Verify SSD firmware status with the manufacturer’s tool; follow vendor guidance.
- If an SSD fails mid‑write, stop and image the drive; contact vendor support.
- For organizations, hold KB5063878 in staged deployments until positive validation is received. (windowscentral.com)
Guidance for IT administrators and organizations
Enterprises should treat this as a classic compatibility risk with the potential for high-impact user-facing data loss. Recommended actions for IT teams:- Stage updates in pilot rings that include devices representative of real-world storage hardware and heavy-write workloads (game installs, VM clones, bulk media copies). This particular issue surfaced because heavy sequential writes exercised corner cases that normal desktop use often does not.
- Use WSUS, SCCM or Update Management to withhold the KB for fleets with at-risk storage until vendors and Microsoft publish verified guidance or mitigation. Document the affected hardware inventory (model, firmware version, motherboard BIOS/UEFI and storage driver levels).
- If end users report missing drives or corrupted writes, capture Event Viewer logs, collect NVMe-host traces, and follow vendor support procedures for imaging prior to any destructive remediation. Forensics-friendly handling preserves the possibility of partial recovery.
- Coordinate with procurement and vendors: ask SSD vendors whether they have validated firmware and whether they recommend mitigation steps for devices in the fleet. Hold an RMA policy discussion in case a small percentage of devices require replacement.
Recovery and data-recovery realities
A minority of reported cases required vendor-level intervention (firmware reflash, reformat, or RMA) to recover a drive that remained inaccessible after reboot. Many affected units recovered temporarily after reboot but still exhibited file corruption for the data written during the failure window. That means:- Successful post‑incident recovery is not guaranteed and depends heavily on the exact failure mode (controller hang vs. metadata corruption vs. physical flash errors).
- Imaging the affected drive immediately preserves the opportunity for advanced recovery; continuing to power-cycle and write increases the chance of permanent metadata loss.
- Professional data recovery services may be able to retrieve data in some cases, but costs and success rates vary widely; the only reliable prevention is an up-to-date backup.
Critical analysis: strengths and limitations of the current evidence
Strengths- Multiple independent test benches and community researchers reproduced a consistent symptom fingerprint under similar workloads, which is strong evidence that the problem is real and not pure coincidence. (tomshardware.com)
- Vendor acknowledgement from a major controller company (Phison) and Microsoft’s active investigation elevate the issue to an industry incident rather than isolated anecdotes. (bleepingcomputer.com) (bleepingcomputer.com)
- Public evidence remains largely community-derived; final root-cause attribution (host OS regression vs. controller firmware bug vs. platform/BIOS interaction) has not been published by vendors or Microsoft in a forensic post-mortem. Until then, lists of "affected models" are provisional and may include false positives or omit impacted variants.
- The scale of the problem across Microsoft’s global install base is unclear: Microsoft reported it could not reproduce the issue in its internal telemetry at the time of early reports, which suggests the problem may be limited to particular firmware revisions, platform configurations, or workloads. That uncertainty complicates enterprise decisions about blanket rollback or hold actions. (bleepingcomputer.com)
- The community-identified thresholds (50 GB, >60% full) are empirically useful but should not be treated as strict guarantees; some drives may fail below these levels depending on specific firmware, host drivers, and I/O patterns. (windowscentral.com)
- Any headline that claims the update will definitively "erase all files" on all SSDs overstates the current evidence. The risk is real for certain workloads and devices, and data written during a failure event is at high risk, but mass destruction across all SSDs has not been demonstrated by credible global telemetry. Reported cases include both recoverable and unrecoverable outcomes, which is why the practical advice is to back up and avoid risky writes until vendors confirm mitigations.
What to expect next
- Short term: Microsoft and controller vendors will continue coordinated diagnostics. Expect incremental guidance (vendor microcode/firmware advisories or driver updates) and a Known Issue entry if Microsoft confirms the correlation and crafts an OS-side mitigation or upgrade block for specific hardware IDs. (bleepingcomputer.com)
- Medium term: firmware updates for affected controller families and possible Windows servicing adjustments are the likely fix vectors. Firmware fixes typically require vendor testing across OEM assemblies and platform BIOS versions, so the timeline can vary from days to weeks depending on severity and complexity. (tomshardware.com)
- Long term: this incident reinforces the importance of real-world, heavy-write testing in pre-deployment validation and the need for coordinated release-health telemetry and clearer vendor communication for storage-critical changes.
Final verdict and conclusion
The evidence assembled by independent test benches, specialist outlets and community collations shows a real storage-regression risk tied to the August 2025 Windows 11 cumulative update (KB5063878) under specific heavy-write conditions. Microsoft and SSD vendors have acknowledged the investigation, which moves this from rumor to an active engineering incident—but the full root cause and a universal fix were not public at the time investigative coverage escalated. (support.microsoft.com) (tomshardware.com)Pragmatically, the responsible posture for both consumers and IT administrators is clear and conservative: back up valuable data now, avoid sustained large writes on systems that received the update, verify firmware with vendors before applying risky workloads, and stage enterprise deployments. That approach minimizes the real but context-dependent risk of data corruption while allowing vendors and Microsoft time to deliver a tested remediation.
This incident is a stark reminder that modern storage reliability is a co-engineered property of OS, driver, controller firmware, BIOS/UEFI and workload. When any one of those components changes, latent edge-cases can surface with outsized consequences for data integrity. Until vendors publish validated fixes and Microsoft posts definitive guidance, the simplest and most reliable defense remains prudent backups and cautious I/O behavior.
Source: GB News Updating Windows 11 this weekend could cause the SSDs with ALL of your files to VANISH, PC owners warned