Microsoft’s August cumulative for Windows 11 — released as
Microsoft published
Within days of the rollout, hobbyist testers and multiple specialist outlets independently reproduced a consistent failure profile: during extended, sequential write workloads — typically when copying or installing very large files or folders — certain SSDs stop responding and vanish from File Explorer, Device Manager and Disk Management. In many reproductions the controller telemetry or SMART attributes are no longer readable to vendor utilities; in a smaller number of reports the affected volume returns but contains corrupted, missing, or inaccessible data. That pattern has been reported around sustained transfers of roughly 50 GB and when drive/controller utilization climbs above ~60%. (guru3d.com) (notebookcheck.net)
This is not a theoretical performance bug: the operational fingerprint is a controller-level hang or lockup that makes the device invisible to the host, which — depending on how the write was committed — can leave files in a partially written or inconsistent state.
Community reporting has exposed a reproducible and consequential class of storage regressions; the responsible response is rapid, coordinated remediation rather than alarm-driven panic. Prior incidents show that firmware updates and targeted OS mitigations can and do resolve these interactions when manufacturers and platform providers cooperate. For now, preserve data, exercise caution with large file operations, and watch Microsoft and SSD vendors for official advisories and tested firmware releases. (support.microsoft.com) (igorslab.de)
Source: bgr.com Microsoft's Latest Windows 11 Update Is Reportedly 'Killing' Some SSDs - BGR
KB5063878
(OS Build 26100.4946
) — is now at the center of a rapidly developing reliability story: independent testers and multiple tech outlets report that, under sustained large writes (commonly cited around 50 GB and above), some NVMe SSDs can become unresponsive, disappear from Windows, and in a minority of cases return corrupted or unreadable — symptoms that amount to real data‑integrity risk for affected users. (tomshardware.com) (igorslab.de)
Background / Overview
Microsoft published KB5063878
as the August 12, 2025 cumulative update for Windows 11, version 24H2 (OS Build 26100.4946
). The public Microsoft support entry lists the security and quality fixes in the release and, at the time community reports began to surface, stated that Microsoft was “not currently aware of any issues with this update.” (support.microsoft.com)Within days of the rollout, hobbyist testers and multiple specialist outlets independently reproduced a consistent failure profile: during extended, sequential write workloads — typically when copying or installing very large files or folders — certain SSDs stop responding and vanish from File Explorer, Device Manager and Disk Management. In many reproductions the controller telemetry or SMART attributes are no longer readable to vendor utilities; in a smaller number of reports the affected volume returns but contains corrupted, missing, or inaccessible data. That pattern has been reported around sustained transfers of roughly 50 GB and when drive/controller utilization climbs above ~60%. (guru3d.com) (notebookcheck.net)
This is not a theoretical performance bug: the operational fingerprint is a controller-level hang or lockup that makes the device invisible to the host, which — depending on how the write was committed — can leave files in a partially written or inconsistent state.
What the patch actually is (and what it isn’t)
The official release
KB5063878
is a combined Servicing Stack Update (SSU) + Latest Cumulative Update (LCU) for Windows 11 (24H2), distributed on August 12, 2025. The KB page details file lists, component changes and security fixes. Microsoft’s public page did not list a storage-device regression as a known issue at the time early community reports surfaced. (support.microsoft.com)
What community testing uncovered
- Independent reproductions consistently associate the failure with sustained, sequential writes and higher drive utilization.
- The symptom set points to the SSD controller becoming unresponsive or the drive being removed from the OS topology rather than the host simply slowing or throwing a recoverable I/O error. (igorslab.de) (tomshardware.com)
Symptoms and how failures present in the wild
Commonly reported symptoms
- Sudden disappearance of an SSD from File Explorer, Device Manager and Disk Management while a large copy or install is running. (tomshardware.com)
- Event Viewer showing storage controller, NVMe or I/O error messages near the time of failure. (guru3d.com)
- SMART and controller telemetry becoming unreadable to vendor utilities after the event. (igorslab.de)
- Reboot sometimes restores device visibility, but data written during the failure window can be corrupted or missing.
Typical trigger profile
- Sustained sequential writes of roughly 50 GB or more, especially when the target drive is already substantially utilized (community reports indicate ~60% or higher). This behavior shows up during large game installs or archive extractions — real‑world tasks that routinely move tens of gigabytes of data. (notebookcheck.net) (borncity.com)
Which drives and controllers are implicated (and what’s still uncertain)
Early community collations and independent testers have repeatedly flagged a cluster of devices and controller families, but there is no single definitive list and not every drive with the same controller is affected.- Drives and controller families often mentioned in reporting:
- Corsair Force MP600 (Phison E16). (igorslab.de)
- SSDs built around Phison controller families such as PS5012‑E12, E21T, E31T and others. (notebookcheck.net)
- SanDisk Extreme Pro M.2 NVMe (reported in some lists despite not using a Phison controller). (guru3d.com)
- A scattering of other models (KIOXIA Exceria Plus G4, Fikwot FN955, Crucial P3 Plus, WD Blue SN5000) appeared in community test lists. (notebookcheck.net)
Technical analysis — plausible mechanisms
Multiple independent analysts and community engineers have converged on a small set of plausible mechanisms. None are yet confirmed by Microsoft or the SSD vendors, but the technical fingerprint lines up with these hypotheses:- Host Memory Buffer (HMB) and allocation changes. Previous Windows 11 24H2 interactions showed that changes in how Windows allocates HMB to DRAM‑less NVMe SSDs can expose firmware limits or race conditions. A larger HMB allocation or altered timing could put some DRAM‑less controllers into edge conditions.
- NVMe command/timing regression in the storage stack. Small kernel-side changes in buffering, command ordering or DMA timing under sustained sequential writes can expose latent controller bugs that only appear under long, high‑utilization workloads. The resulting controller hang would present as a disappeared drive to the host. (guru3d.com)
- Controller firmware edge cases under high utilization. SSD controllers manage mapping tables, garbage collection, wear leveling and thermal throttling. Extended big writes stress those subsystems; a firmware bug triggered by altered host behavior can cause the controller to lock up or fail to respond. (igorslab.de)
Verification status and official responses
- Microsoft’s KB page for
KB5063878
lists the update and the build number and, at time of the early reports, stated that Microsoft was not aware of any issues with the update. That means an official “known issues” entry explaining or acknowledging the storage symptom had not been posted when initial reporting occurred. (support.microsoft.com) - Major enthusiast and hardware outlets (Tom’s Hardware, Igor’s LAB, Guru3D, NotebookCheck, BornCity) documented community reproductions and flagged the same symptom profile. These outlets independently confirmed the trigger characteristics and provided aggregated device lists from early testers. (tomshardware.com) (igorslab.de) (guru3d.com)
- As of reporting, SSD vendors had not universally issued a single, consolidated advisory about
KB5063878
; vendor responses were staggered and — in many cases — limited to firmware‑update notices for earlier 24H2 compatibility problems. That heterogeneity underscores the need for coordinated telemetry from Microsoft and individual vendors to produce a definitive fix. (borncity.com)
Immediate risk assessment — how bad is this for the average user?
- Prevalence: early reporting indicates a small but significant cluster of reproducible incidents rather than a global, immediate failure across the entire Windows installed base. The practical risk is concentrated on systems performing large sustained writes to drives that are on community watch lists. (notebookcheck.net)
- Severity: when the condition occurs, the impact can be severe. Files being written during the failure window are at real risk of corruption or loss; some reports describe drives becoming inaccessible even after reboot. That elevates the incident from mere inconvenience to a potential data‑loss event for affected users. (guru3d.com)
- Reproducibility: community reproductions demonstrate that the symptom can be triggered reliably on specific system+drive+firmware combinations, which strengthens the claim that the KB is a causal factor — though causality needs final confirmation from Microsoft and vendors. (igorslab.de)
Practical mitigation steps (consumer and prosumer)
Take the following conservative, actionable steps immediately ifKB5063878
is installed on a system that uses NVMe SSDs, especially if those drives are on community watch lists.- 1.) Back up critical data now. The top priority is preventing irreversible loss; copy high‑value files to an external drive or cloud storage before performing large writes. (notebookcheck.net)
- 2.) Avoid sustained large writes (game installs, large archive extraction, bulk media copies) to suspect drives until vendor or Microsoft guidance arrives. Community reproductions show the issue primarily during extended sequential writes near ~50 GB. (guru3d.com)
- 3.) Check Windows build and the KB. Run
winver
or check Settings → Windows Update → Update history to confirm whetherKB5063878
(Build26100.4946
) is installed. If it is and you rely on an affected drive, avoid heavy write workloads. (support.microsoft.com) - 4.) Inspect vendor firmware and tools. Use your SSD vendor’s dashboard/utility to check firmware versions; apply only vendor‑recommended firmware updates — after backing up — because firmware can address controller bugs that interact with host changes. (borncity.com)
- 5.) If a drive disappears during a transfer: power down the system, document event timestamps and logs (Event Viewer), image the drive if the data is critical, and contact vendor support. Imaging immediately preserves forensic evidence and increases the chance of data recovery.
- 6.) Do not use the standalone wusa uninstall for the combined package: because this KB is shipped as a combined SSU + LCU, the LCU cannot be removed with
wusa /uninstall
. Microsoft documents usingDISM /Remove‑Package
for the LCU portion. Administrators who need to block the update should use Device Management tools (WSUS, SCCM, MDM) or pause updates per Microsoft’s guidance. (support.microsoft.com)
Guidance for IT administrators and fleet managers
- Stage the rollout. Pause broad deployment of
KB5063878
across production fleets and testKB5063878
against representative hardware with large‑write workloads in a controlled environment. Community reports indicate this class of bug is workload-sensitive and can be caught by large‑write regression tests. - Use update management tools. Leverage WSUS/SCCM (and Microsoft’s Known Issue Rollback mechanisms) to withhold or selectively distribute the update while investigations continue. There were earlier enterprise deployment regressions tied to this KB that required a re‑release for WSUS/SCCM channels, illustrating the need for controlled staging.
- Collect telemetry for vendor escalation. If a drive fails, collect logs, SMART dumps, vendor diagnostics, and an image if possible, then open tickets with the SSD vendor and Microsoft. Coordinated telemetry from vendor firmware and Microsoft kernel-level diagnostics will be necessary to reach a durable fix.
How this gets fixed: realistic remediation pathways
- Vendor firmware updates. If the root cause is a controller firmware edge case exposed by altered host behavior, vendors will need to release firmware updates to handle the changed timing/command sequences or to harden recovery paths. These updates will likely be the fastest path to a durable fix for affected drives. (igorslab.de)
- Microsoft mitigation or rollback. If the cause proves host-side (a storage stack regression), Microsoft can either publish a targeted mitigation (e.g., a change in how the OS issues long sequential writes or adjustments to HMB allocations) or reissue a corrected package for the affected component. Microsoft also has the Known Issue Rollback (KIR) tools to mitigate install/distribution regressions. (support.microsoft.com)
- Combined fix approach. It is plausible the final solution will be a combination of vendor firmware updates plus a Microsoft adjustment — the same cooperative remediation approach used in past 24H2 firmware/compatibility incidents.
What to watch next
- Microsoft Release Health and the
KB5063878
support page for any new Known Issues entries or mitigations. (support.microsoft.com) - Official advisories and firmware releases from SSD manufacturers for specific controller families (Phison statements, Kioxia, Corsair, WD/SanDisk). (borncity.com)
- Independent reproductions and technical write‑ups from storage specialists (Igor’s LAB, Guru3D) that provide reproducible test cases and device lists; these are useful for risk triage but are not a substitute for vendor confirmation. (igorslab.de) (guru3d.com)
Strengths and weaknesses of the current evidence
Notable strengths
- Multiple independent testers and reputable enthusiast outlets reproduced a consistent symptom profile with similar trigger characteristics. That reproducibility strengthens the causal link to the update and reduces the probability of incidental hardware faults. (tomshardware.com) (guru3d.com)
- The failure fingerprint (controller invisibility, unreadable SMART, corruption of files written during the window) points to a controller-level event rather than a simple OS UI glitch; such a signature is technically meaningful for root-cause hypotheses. (igorslab.de)
Key uncertainties and risks
- Microsoft had not, at the early reporting stage, added a storage-related “known issue” entry for
KB5063878
. That absence leaves some open questions about how widespread the company believes the problem to be and whether an official mitigative action is imminent. (support.microsoft.com) - Community-sourced device lists are valuable but incomplete. They cannot substitute for vendor and Microsoft telemetry; not every drive with a named controller is affected, and not every affected drive behaves identically, which complicates mass communication and remediation. (notebookcheck.net)
- There is a real risk of data loss for users who continue to perform large transfers on potentially affected hardware. Post‑incident recovery varies and may sometimes require RMA or reformatting that destroys user data if not imaged first.
Recommendations — concise checklist
- Back up critical files to external or cloud storage now. (notebookcheck.net)
- Avoid large sequential writes to NVMe drives until firmware or Microsoft guidance is available. (guru3d.com)
- Check firmware and vendor utilities; apply vendor-recommended firmware updates only after backing up. (borncity.com)
- If a drive fails during a transfer: power off, image the drive if the data is valuable, and collect logs for vendor/Microsoft support.
- Admins: stage
KB5063878
and hold deployment for machines with susceptible drives; use WSUS/SCCM controls and monitor Microsoft Release Health.
Conclusion
TheKB5063878
episode is an unsettling reminder that even routine cumulative updates can interact with complex device firmware in unexpected ways. Independent reproductions by enthusiasts and specialist outlets show a technically coherent failure mode: sustained large writes can cause certain SSDs to stop responding and, in some cases, leave behind corrupted data. The evidence so far is sufficient to warrant immediate, conservative action — back up data, avoid mass writes on vulnerable drives, and pause broad deployment in managed environments — while leaving open the need for vendor and Microsoft telemetry to deliver a definitive fix.Community reporting has exposed a reproducible and consequential class of storage regressions; the responsible response is rapid, coordinated remediation rather than alarm-driven panic. Prior incidents show that firmware updates and targeted OS mitigations can and do resolve these interactions when manufacturers and platform providers cooperate. For now, preserve data, exercise caution with large file operations, and watch Microsoft and SSD vendors for official advisories and tested firmware releases. (support.microsoft.com) (igorslab.de)
Source: bgr.com Microsoft's Latest Windows 11 Update Is Reportedly 'Killing' Some SSDs - BGR