Microsoft Weekly: what happened with the SSD scare, the 25H2 ISO delay, and what you should actually do now
Summary (quick)
- A widely shared set of social-media reports in August 2025 claimed the August cumulative security update for Windows 11 (KB5063878 / 24H2 servicing stream) was causing SSDs and HDDs to disappear, show I/O/SMART errors, or even suffer permanent corruption after large write operations. Major vendors and Microsoft investigated and — as of late August / early September 2025 — have publicly stated they were unable to reproduce a causal link between the patch and hardware failures. (bleepingcomputer.com, theverge.com)
- SSD controller maker Phison performed extensive validation (multi‑thousand hour test cycles) and reported it could not reproduce the problem; Phison’s testing and Microsoft’s telemetry are the principal reasons both parties announced there was no evidence the update was to blame. That testing and Microsoft’s service‑alert updates are central to the current position. (pcgamer.com, bleepingcomputer.com)
- Separately, Microsoft put Windows 11 version 25H2 into the Release Preview channel and initially said official ISO images would be posted “next week,” but the Windows Insider post was edited and the ISO delivery was later listed as delayed / “coming soon.” This has frustrated admins, system builders, and anyone who needs official ISOs for imaging and validation. (blogs.windows.com, softzone.es)
- Bottom line for users: don’t panic; take conservative steps now (back up immediately, avoid big/continuous writes to any drive that is > ~60% full until your drive vendor confirms your model is OK, check and update SSD firmware via vendor tools only after contacting vendor and backing up). For enterprise admins: gather diagnostics, consider temporarily deferring the August patch for vulnerable fleets, and avoid ad‑hoc firmware updates at scale without vendor guidance. (windowscentral.com, windowslatest.com)
1) The update and the first reports
- On August 12, 2025 Microsoft shipped a security servicing update that delivered fixes for Windows 11 (the August cumulative security update for the 24H2 servicing branch). Soon after, posts began circulating describing systems where drives would become unreadable, disappear from Device Manager, return I/O errors during large transfers (50+ GB), or show unknown SMART states. The concern spread quickly on social platforms and tech forums. (windowscentral.com)
- Microsoft acknowledged it was aware of customer reports, opened an investigation, and asked customers to submit diagnostic details via Support/Feedback Hub so it could try to reproduce the behavior and correlate it with telemetry. The company said it was working with storage partners to reproduce and analyze reported cases. (bleepingcomputer.com)
- Phison (an SSD controller vendor named in many reports) and others performed extended testing. Phison reported thousands of cumulative testing hours (2,200+ test cycles totaling ~4,500 hours in coverage referenced by press reporting) and said it was unable to reproduce the failure modes described in social posts; it also reported it had received no partner/customer reports confirming the problem at scale. Microsoft likewise reported its telemetry and testing had not detected an increase in disk failures linked to that update. Based on those findings Microsoft stated it had “found no connection” between the update and the types of drive failures being reported. (pcgamer.com, bleepingcomputer.com)
- Despite vendor and Microsoft statements, isolated users continue to report similar failures in forums and social posts — often with anecdotal details (drive model, percent full, what the user was copying) but with limited reproducible evidence shared publicly. Because of that mismatch (few verified reproducible cases vs. many alarmed social posts) some skepticism remains in the community. Microsoft and partners say they will continue to monitor incoming reports. (techradar.com, windowslatest.com)
- Storage failures and data loss are high‑impact events; even a few credible reports spark wide concern because the risk is catastrophic for affected users.
- The reported pattern — large sequential writes on drives >~60% full causing the issue — suggested a timing window that would be encountered naturally by gamers, installers, or people moving big archives, which are common workloads.
- SSDs rely on vendor firmware and controller logic; when an OS update changes caching, write-back behavior, or queue depth handling it can expose latent firmware bugs. That possibility is why Microsoft and vendors treat these reports seriously. At the same time, after broad testing the vendors did not find a consistent software‑level trigger they could replicate in lab conditions. (windowslatest.com, windowscentral.com)
- Microsoft: after investigation, Microsoft said it found no connection between the August 2025 Windows security update and the reported hard‑drive failures, while continuing to collect and review customer reports. (bleepingcomputer.com)
- Phison: the controller vendor performed extensive test cycles (reported multi‑thousand hour runs) on reported drive types and could not reproduce the issue; Phison reported no partner or customer confirmations of a widespread problem. (pcgamer.com)
- Independent press coverage: major tech outlets (The Verge, Windows Central, TechRadar, PCWorld, PC Gamer, etc.) reached the same basic conclusion — testing and telemetry have not corroborated a broad software-induced bricking issue, though isolated reports persist and investigating continues. (theverge.com, windowscentral.com, pcworld.com, pcgamer.com)
This is split into immediate, short-term, and longer-term actions, and is tailored for home users, power users / technicians, and enterprise admins.
For all users — immediate (do this now)
- Back up everything important now.
- Use the 3‑2‑1 rule: at least three copies of important data, on two different media types, with one copy off‑site (cloud or physically stored elsewhere). If you have any data you can’t replace, back it up before doing any troubleshooting or firmware updates. (This is general best practice and was specifically recommended in reporting around the incident.) (windowscentral.com)
- If your system has already installed the August 2025 update and your SSD is working normally, avoid heavy continuous writes for the time being.
- Multiple reports indicate the problem (where it exists) tends to occur during large continuous writes or large archive decompressions, particularly on drives that are already largely full. Until you’re comfortable there’s no issue with your specific drive, avoid copying very large single files or writing tens of GB at once. (windowslatest.com)
- Don’t flash firmware at scale without a plan.
- Firmware updates can fix controller bugs but can also carry risk. If a vendor issues an official firmware update for your model, follow vendor instructions, ensure you have a good backup, and apply the firmware update on a single test machine first. Contact vendor support if you see unexpected behavior. (pcgamer.com)
- Check SMART and drive health now.
- Use a simple SMART tool (CrystalDiskInfo, vendor dashboard apps) to get a baseline SMART log and save it as a file. If you later need to escalate, that baseline helps diagnostics.
- Run manufacturer diagnostic tools if you’re worried.
- Samsung Magician, WD Dashboard, Crucial Storage Executive and similar vendor tools can run checks and may offer firmware updates and health reports. Use only the official tool for your brand/model.
- If you own an SSD that is >60% full, free up space if possible.
- The pattern in multiple reports suggested drives already near capacity are more likely to show symptoms during large sequential writes. Freeing space lowers the chance of hitting those edge conditions.
- Capture logs and steps.
- If you see an incident: (a) stop writing to the drive, (b) capture Windows Event Viewer logs (System and Application) around the time of failure, (c) capture diskpart / list disk output, and (d) collect SMART dumps via a vendor utility or smartctl. Store those reports alongside the user’s notes on what operation was being done when the failure occurred.
- Try a controlled reproduce on a non-critical machine.
- If you must attempt reproduction, do it on a test bench with known‑good backups and monitoring. The problem has been hard to reproduce in labs; don’t risk production data.
- If a drive becomes inaccessible, avoid destructive writes.
- Use read‑only forensic imaging tools if data recovery is required, or contact the vendor for guidance. Reformatting or reserialize actions may destroy recoverable evidence.
- Inventory potentially affected models and percent‑full status.
- Prioritize devices with SSDs that are more than ~60% occupied or used for large file workflows (content creators, build servers, imaging stations).
- Defer or stage the August 2025 patch for high‑risk groups.
- If you operate large fleets, consider a targeted deferral until you’re satisfied with testing. Use WSUS / WUfB / patch rings to stage the update to smaller cohorts and watch for anomalies. Microsoft’s own guidance when investigating included collecting detailed customer reports; your internal telemetry is critical here. (bleepingcomputer.com)
- Collect telemetry and create an escalation process.
- Ensure endpoint monitoring can surface disk I/O errors, application hangs during file copies, SMART errors, and unusual disk removal events. If vendors publish diagnostic request templates, use them for consistency.
- Don’t mass‑push firmware unless instructed by vendor.
- If a drive vendor issues an official firmware fix, validate on a small representative sample and ensure you have a rollback plan and vault backups.
- Hardware bugs triggered by OS changes are plausible (OS changes caching / write‑strategy behavior). That is why the reports were treated seriously. But large vendor test campaigns and Microsoft telemetry have not found a reproducible pattern that proves causality at scale. That combination — intrinsic plausibility plus lack of reproducible lab evidence — produces lingering debate rather than definitive confirmation. (windowslatest.com, pcgamer.com)
- Windows 11 version 25H2 was released into the Windows Insider “Release Preview” channel (Build 26200.5074) on August 29, 2025. The Windows Insider blog post that announced Release Preview explicitly said ISO images would be posted to the Windows Insider ISO page “next week.” Later updates and reporting indicated Microsoft edited the post and that the ISOs would be delayed / “coming soon,” with no firm public release date for the official ISOs. That edit + delay is the source of the “ISO delayed” headlines. (blogs.windows.com, softzone.es)
- Even though 25H2 is delivered as a lightweight enablement package for systems already on 24H2, official ISOs remain important for:
- OEMs and system builders for certification and shipping images,
- Enterprise imaging and offline validation (SCCM/WSUS golden images),
- Security/EDR vendors recreating clean baselines for testing,
- IT shops that need a canonical installation medium for troubleshooting or bare‑metal deployments. (windowsforum.com)
- Official recommendation: wait for Microsoft to publish the ISO on the Windows Insider/download page.
- Alternatives (with caution): advanced users sometimes use UUPDump to build ISOs from Insider UUP files; that works for testing but is unofficial and not appropriate for production or corporate images unless you understand the support implications. If you must build images now, treat them as temporary and validate thoroughly. (techcommunity.microsoft.com, windowscentral.com)
- Always download ISOs and tools from official Microsoft channels. Verify checksums when Microsoft publishes them. Unofficial or scraped ISOs can be tampered with and present security risks.
- Avoid using unverified “official‑looking” documents or leaked guidance; Phison pointed out there were false/fake documents circulating that incorrectly blamed it, and that kind of disinformation further confuses incident response. Rely on vendor blogs, official support advisories, and the Microsoft Admin Center for authoritative information. (windowscentral.com, pcgamer.com)
- Microsoft: continue to monitor telemetry and any new customer reports; investigate and update the service alert if new evidence emerges. Microsoft asked affected customers to provide detailed diagnostics to help isolate any reproducible pattern. (bleepingcomputer.com)
- Vendors (example: Phison): continue lab validation, provide guidance for thermal and extended‑workload scenarios (Phison reiterated good practice guidance — e.g., proper thermal dissipation for heavy workloads) and coordinate with OEM partners. (windowscentral.com)
- If you’re a home user:
- Back up right now (3‑2‑1).
- If patched already, avoid writing very large files to drives that are >60% full until you’ve checked drive health.
- Run vendor health tools and save SMART logs.
- If you suspect data loss, stop further writes and consider vendor/recovery support.
- If you’re a technician:
- Capture event logs and SMART dumps immediately after an incident.
- Use vendor tools for diagnostics and do not rush into firmware updates without test validation.
- If you can reproduce a failure in lab, document steps precisely and coordinate with vendor/Microsoft support.
- If you’re an enterprise admin:
- Prioritize backup/DR verification for content creators and build servers.
- Stage the patch with test rings; defer for high-risk devices if required.
- Contact Microsoft and vendor support with standardized diagnostic bundles if you see problems.
- This is an incident that rightly received fast attention, but the available authoritative evidence (Microsoft telemetry and multi‑thousand hour vendor testing) does not currently show a systematic, reproducible failure mode caused by the August 2025 Windows update. That said, because SSD failures can be catastrophic for users, the conservative, practical actions above are the right way to proceed: back up, monitor, and stage updates where possible. If you have an actual, reproducible failure on a fully patched system, collect diagnostics and escalate to Microsoft and the drive vendor so the industry can continue to investigate. (bleepingcomputer.com, pcgamer.com)
- Produce a one‑page printable checklist for end users and another for IT teams (quick action items and contact templates).
- Walk you step‑by‑step through creating a vendor SMART report and saving event logs (commands and tools tailored to your OS build).
- Help draft an internal IT bulletin (short email/text) you can send to users explaining the issue and actions to take.
Source: Neowin Microsoft Weekly: More on SSD issues, 25H2 ISO delayed, big updates, and more