Microsoft’s August Patch Tuesday delivered a surprise that quickly escalated from a support thread to a cross-industry incident: the Windows 11 cumulative update KB5063878 has been linked by multiple users to SSD and HDD failures, data corruption, and drives “vanishing” during heavy write activity, particularly on systems running Windows 11 24H2. Reports describe drives dropping out mid-transfer, corruption appearing after sustained writes when the drive is more than ~60% full, and in some cases total device loss that required power-cycling or firmware-level recovery. The issue has drawn responses not only from Microsoft but also from controller vendors and PC builders, and it has prompted urgent advice for users and IT teams to pause deployments, preserve forensic data, and coordinate with hardware manufacturers while investigations continue.
Microsoft’s August 2025 Patch Tuesday included a security update identified as KB5063878 for Windows 11 24H2. Soon after the rollout, users began reporting storage problems during large file transfers and heavy write loads. Initial flags came from a system integrator in Japan, who observed drives disappearing during extended write tests. Soon after, owners of drives using controllers from Phison and InnoGrit (and those from vendors such as Corsair, SanDisk, and Kioxia) described similar failure modes.
Affected drives and product families reported by users include, but are not limited to:
Microsoft’s public posture reported an inability to reproduce the issue uniformly across test systems and prompted requests for user feedback through the Feedback Hub and Microsoft Support for Business. Controller vendor Phison confirmed it is collaborating with Microsoft and other industry stakeholders to determine the scope and root cause.
Phison’s announcement that it is working with Microsoft and industry stakeholders indicates controller vendors are taking the reports seriously. Controller vendors have the ability to analyze firmware stack traces and to test thousands of host combinations; their involvement increases the likelihood of a targeted firmware patch if the root cause is found in controller logic.
The involvement of hardware and drive manufacturers means this could be resolved through:
Key takeaways:
Source: Windows Report Microsoft Seeks Feedback From Users About Windows 11 KB5063878 Update Causing SSD & HDD Failures
Background
Microsoft’s August 2025 Patch Tuesday included a security update identified as KB5063878 for Windows 11 24H2. Soon after the rollout, users began reporting storage problems during large file transfers and heavy write loads. Initial flags came from a system integrator in Japan, who observed drives disappearing during extended write tests. Soon after, owners of drives using controllers from Phison and InnoGrit (and those from vendors such as Corsair, SanDisk, and Kioxia) described similar failure modes.Affected drives and product families reported by users include, but are not limited to:
- Corsair Force MP600 series
- SanDisk Extreme Pro NVMe SSDs
- Kioxia Exceria Plus G4 and other Kioxia-branded NVMe products
- Drives powered by Phison controllers
- Drives powered by InnoGrit controllers
Microsoft’s public posture reported an inability to reproduce the issue uniformly across test systems and prompted requests for user feedback through the Feedback Hub and Microsoft Support for Business. Controller vendor Phison confirmed it is collaborating with Microsoft and other industry stakeholders to determine the scope and root cause.
How this could happen: technical overview
Understanding possible failure modes requires looking at the intersection of several complex layers: the SSD controller firmware, NVMe driver behavior, the Windows storage stack, and system firmware (UEFI/BIOS). Any of these layers — alone or in interaction — can trigger the observed symptoms.NVMe controller firmware and write handling
SSD controllers manage wear leveling, garbage collection, and flash translation layer (FTL) tasks. Under sustained write pressure, controller firmware can enter error states if unexpected command sequences, timeouts, or power-management signals are received. If a firmware bug is exposed only by a specific host driver or OS behavior — for example, a change introduced by a security update — the drive can become unresponsive or corrupt data.Windows storage stack and driver interactions
Windows relies on a stack that includes the NVMe driver (StorNVMe or third-party drivers), storage filter drivers, and file system drivers (NTFS, ReFS). A security update may alter IO timing, buffer handling, or I/O request packet (IRP) processing that, while benign on most hardware, can trigger edge-case firmware bugs. When firmware assumes certain timing or ordering guarantees that are changed, the result can be sudden device disappearance or broken write completions.Power management and thermal behavior
Updates occasionally change power-management defaults or introduce stricter enforcement on device idleness or throttling. SSDs under sustained load produce heat; when capacity is high (>60% reported by several users), thermal throttling and FTL pressure increase. Coupled with altered host-side behavior, this thermal and internal resource pressure could reveal latent bugs.File system and write-cache considerations
Heavy write workloads and almost-full drives amplify write amplification and internal garbage collection. If the OS signals a flush or flush semantics change, firmware that mishandles these commands may corrupt mapping tables, producing the data loss users describe.What we know so far (confirmed points and reasonable inferences)
- Multiple independent user reports describe the same symptom set: drives disappearing under heavy writes after installation of KB5063878 on Windows 11 24H2.
- Affected drives include models from Corsair, SanDisk, and Kioxia, and drives using Phison and InnoGrit controllers were reported commonly.
- The initial failure reports mentioned the problem being more pronounced when a drive was more than roughly 60% full.
- Microsoft has publicly asked for more user feedback and noted it has been unable to reproduce the issue broadly on updated systems.
- Phison has stated it is working with Microsoft and other stakeholders to assess the impact.
- Whether KB5063878 is the root cause, a trigger, or merely correlated with the issue in that same timeframe.
- Whether the fault lies in Windows kernel/driver changes, altered IO handling introduced by the update, or stricter enforcement of standards that exposed firmware bugs.
- The precise firmware revisions, host hardware, or storage configuration combinations that reproduce the problem consistently.
Immediate actions for users and IT administrators
Until a definitive root cause and fix are published, affected organizations and users should follow a conservative, data-protective approach.For home users and enthusiasts
- Back up immediately. If you suspect a drive is affected, prioritize full backups of critical data to an unaffected volume or to cloud backup services. Do not delay backups while troubleshooting.
- Avoid heavy write workloads on suspect systems. Postpone large file transfers, cloning operations, or benchmarks until the situation is clarified.
- Pause or block KB5063878 temporarily if you can: use Windows Update pause features or defer the update via Windows Update settings. Enterprise environments should use update-management tools (WSUS, Intune) to control rollout.
- Check drive health with vendor tools and SMART. Use manufacturer-provided utilities (Corsair SSD Toolbox, SanDisk Dashboard, Kioxia SSD Utility) or third-party SMART tools to capture device logs and SMART attributes.
- Collect system traces and open feedback tickets. Use Feedback Hub to submit a detailed report including Windows Event Viewer logs, and consider opening a support ticket with the drive vendor if the device is still accessible.
- Avoid DIY firmware flasher unless directed. Firmware updates can be hazardous if interrupted; don’t attempt firmware rollback or reflash unless the vendor provides explicit instructions.
For IT admins and enterprises
- Immediately pause deployment of KB5063878 across production rings until vendor guidance or a Microsoft hotfix is available.
- Quarantine affected endpoints. Move impacted devices off critical production duties and limit write-heavy tasks.
- Escalation and vendor coordination. Open coordinated support cases with both Microsoft and the storage vendor. Provide memory dumps, storage logs, Controller Diagnostic outputs, and system event logs.
- Preserve forensic artifacts. Save Event Viewer logs (System and Application), Reliability Monitor output, storage controller dumps, and disk vendor tool logs. Do not reformat or initialize affected disks without first making forensic images when possible.
- Roll back the update for critical systems where safe and feasible through your management platform. Use WSUS, Intune, or Group Policy to block the problematic update and to control future installs.
How to report problems effectively (what to include)
When reporting the issue to Microsoft or a drive vendor, detailed, structured information expedites triage and increases the chance of reproduction.- Windows build and version (exact OS build string).
- The exact KB number and installation timestamp (KB5063878 and install time).
- Drive model, serial number, firmware revision, and controller (if known).
- Motherboard model, BIOS/UEFI version, chipset drivers, and NVMe driver stack.
- Workload that triggered the failure (file sizes, transfer method, benchmark tool).
- Drive capacity and percent used at time of failure.
- Event Viewer logs around the failure time (System and Application).
- SMART logs and vendor diagnostic output prior to failure.
- Steps to reproduce, if possible, with exact commands and tools used.
Vendor and Microsoft responses — what they mean
Microsoft’s statement that it could not reproduce the issue on updated machines is important: it suggests the bug may require a specific confluence of firmware, driver, hardware, and workload to appear. That doesn’t invalidate user reports; complex hardware/firmware bugs often reproduce only under particular conditions.Phison’s announcement that it is working with Microsoft and industry stakeholders indicates controller vendors are taking the reports seriously. Controller vendors have the ability to analyze firmware stack traces and to test thousands of host combinations; their involvement increases the likelihood of a targeted firmware patch if the root cause is found in controller logic.
The involvement of hardware and drive manufacturers means this could be resolved through:
- A Microsoft update restoring previous behavior or patching driver-level issues.
- A firmware update from the SSD controller vendor addressing a bug exposed by the host changes.
- A combination: a Windows patch plus firmware updates to stabilize behavior across hosts.
Risk assessment and likely timelines
Estimating remediation timelines requires balancing incident severity and the complexity of root cause analysis. Historically, similar cross-layer incidents have followed these patterns:- If the fault is purely in a device firmware: vendors can produce firmware patches in a matter of days to weeks, but distribution and safe flashing across diverse hardware can take longer.
- If the fault is in the Windows driver or kernel behavioral change: Microsoft can issue a hotfix or out-of-band update, often within days for high-severity issues, especially where data loss is confirmed.
- If the fault arises from complex interaction (OS change unveiling a latent firmware bug): resolution requires coordinated testing and iterative fixes; this can extend to several weeks.
Forensics and reproducibility: how engineers will investigate
Reproducing this kind of failure in engineering labs involves constructing matching host and storage stacks, including firmware revisions, drivers, BIOS settings, and similar workload patterns. Key investigative approaches include:- Reproducing the workload that triggered failures (large sustained writes, random writes with high queue depth).
- Stress testing with drives at different fill levels (above and below the ~60% threshold reported).
- Running NVMe protocol tracers and capturing NVMe submission and completion logs.
- Comparing behavior with different NVMe drivers (Microsoft default driver vs. vendor drivers).
- Cross-referencing Windows Event logs, kernel dumps, and controller-side debug logs.
- Testing power-management and thermal scenarios to see if throttling correlates with failure.
Practical mitigation checklist (concise)
- Backup critical data now — use an alternate storage medium.
- Pause KB5063878 installation via update controls (home pause or enterprise update rings).
- If you’ve already installed it and see no issues, consider not rolling back immediately but keeping backups and monitoring.
- For affected endpoints, preserve logs and submit Feedback Hub entries; escalate with vendor support.
- Keep firmware and vendor drivers up to date, but apply flash updates only if they explicitly address this issue.
- Avoid heavy write workloads on suspect hardware until resolution.
Long-term considerations for manufacturers and OS vendors
This incident highlights deeper, systemic challenges in modern computing:- The storage ecosystem is complex and heterogeneous: dozens of controller firmware permutations, multiple host drivers, and varied system firmware mean that curated compatibility testing at scale is essential.
- OS updates that change timing, flush semantics, or power management can unintentionally expose latent device bugs; thus, improved co-validation pipelines between OS vendors and controller manufacturers are needed.
- End-users and administrators increasingly rely on rapid patching for security, which can conflict with risk of regressions. Organizations must maintain robust update-management and rollback strategies to avoid production outages.
- Better telemetry and managed feedback routes (automated capture of kernel traces when storage failures occur) would accelerate triage while protecting privacy.
What to expect next
- Microsoft will likely request detailed feedback and logs from affected users and may release guidance to help vendors reproduce the issue.
- Controller vendors will analyze firmware traces and, if implicated, will prepare firmware updates and distribution plans.
- Drive OEMs will provide targeted advisories for affected models and may publish compatibility notes.
- Enterprises should expect communications from their hardware partners and may need to coordinate mass firmware deployment once validated.
Closing analysis
The KB5063878 incident underlines how fragile the interaction between software updates and hardware can be when the stakes include user data integrity. While modern update ecosystems are designed to protect systems from security threats, they also introduce the possibility of regressions that touch low-level hardware interactions.Key takeaways:
- Protect data first — backups are the single most effective defense against update-related corruption.
- Pause and coordinate — enterprises must control update deployment and coordinate with vendors to mitigate risk.
- Collect useful telemetry — detailed logs and reproducible test cases are the currency that vendors and Microsoft need to fix this problem.
- Expect multi-party remediation — fixes may come from Microsoft, controller vendors, or both, and remediation will require careful validation.
Source: Windows Report Microsoft Seeks Feedback From Users About Windows 11 KB5063878 Update Causing SSD & HDD Failures