Microsoft and SSD vendors have opened an investigation after multiple independent testers and users reported that the August 12, 2025 Windows 11 cumulative update (KB5063878, OS Build 26100.4946) can cause some NVMe and SATA drives to stop responding, vanish from the operating system, and — in a smaller number of cases — return with corrupted or inaccessible data following sustained, heavy write activity. (support.microsoft.com) (tomshardware.com)
Microsoft shipped KB5063878 (OS Build 26100.4946) on August 12, 2025 as the regular monthly cumulative (LCU) for Windows 11 version 24H2. The public KB entry lists security and quality improvements but initially stated that Microsoft was “not currently aware of any issues with this update.” (support.microsoft.com)
Within days of the rollout, several community testers and specialist outlets reproduced a consistent failure profile: during sustained, large sequential writes—commonly reported in community tests at roughly 50 GB or more, especially when the target SSD was already moderately full—some drives would suddenly stop responding, disappear from File Explorer and Device Manager, and present unreadable SMART/controller telemetry. Reboots sometimes restored visibility but did not guarantee any data written during the incident window remained intact. (tomshardware.com, bleepingcomputer.com)
Phison — a major SSD-controller designer — publicly acknowledged it had “recently been made aware of the industry‑wide effects of the ‘KB5063878’ and ‘KB5062660’ updates on Windows 11 that potentially impacted several storage devices” and said it was investigating with partners. Microsoft has confirmed it is investigating reports and working with partners. (wccftech.com, tomshardware.com)
Important caveats:
This remains an unfolding, technical investigation that will ultimately require coordinated telemetry and firmware patches to resolve the interplay between Windows’ storage stack and SSD controller firmware. Until vendors publish firm fixes and validated guidance, prioritize backups, stage updates, and treat any mid-write disappearance of a storage device as a potential data‑loss event requiring careful forensic handling. (tomshardware.com, bleepingcomputer.com)
Source: windowslatest.com Microsoft is investigating Windows 11 KB5063878 SSD data corruption/failure issue
Background / Overview
Microsoft shipped KB5063878 (OS Build 26100.4946) on August 12, 2025 as the regular monthly cumulative (LCU) for Windows 11 version 24H2. The public KB entry lists security and quality improvements but initially stated that Microsoft was “not currently aware of any issues with this update.” (support.microsoft.com)Within days of the rollout, several community testers and specialist outlets reproduced a consistent failure profile: during sustained, large sequential writes—commonly reported in community tests at roughly 50 GB or more, especially when the target SSD was already moderately full—some drives would suddenly stop responding, disappear from File Explorer and Device Manager, and present unreadable SMART/controller telemetry. Reboots sometimes restored visibility but did not guarantee any data written during the incident window remained intact. (tomshardware.com, bleepingcomputer.com)
Phison — a major SSD-controller designer — publicly acknowledged it had “recently been made aware of the industry‑wide effects of the ‘KB5063878’ and ‘KB5062660’ updates on Windows 11 that potentially impacted several storage devices” and said it was investigating with partners. Microsoft has confirmed it is investigating reports and working with partners. (wccftech.com, tomshardware.com)
What users and testers are seeing
Core symptoms
- The target drive becomes unresponsive mid-write and may disappear from Device Manager, Disk Management, and File Explorer. (tomshardware.com)
- SMART and vendor telemetry may stop responding and report unreadable or unavailable attributes. (tomshardware.com)
- File copy, extraction, or installation can hang, I/O errors appear in logs, and files written during the event may be corrupted or incomplete. (bleepingcomputer.com)
- In many cases a reboot brings the device back, but in a minority of cases the drive remains inaccessible or the partition shows as RAW — indicating on-disk metadata or partition-table damage. (tomshardware.com, bleepingcomputer.com)
Trigger profile (what reproduces the bug)
Independent community tests converge on a narrow reproduction window:- Sustained, sequential writes of roughly 50 GB or more in a single operation (examples: large game updates, archive extraction, cloning, or mass media copies) were the most consistent triggers. (tomshardware.com, bleepingcomputer.com)
- Drives already >50–60% full appear more vulnerable, likely because effective SLC caching and free-block availability are reduced. (tomshardware.com)
- Splitting the same write into smaller chunks or throttling the write rate sometimes avoided the failure in repeat tests, suggesting the failure depends on sustained pressure to controller/OS buffering stacks.
Which drives appear in reports (and why lists are unreliable)
Early community collations and specialist outlets named several models and controller families more often than others, notably drives using Phison controllers (including the PS5012‑E12 lineage and related families), and a handful of designs from other controller vendors. Examples surfaced in testing logs and posts: WD Blue SN5000, Corsair MP600 / MP510, Crucial P3 Plus, SK hynix Platinum P41, ADATA LEGEND 800, XPG SX8200 Pro and others.Important caveats:
- Not every drive of a named model or controller family fails in every test bench. Firmware revision, NAND configuration, drive capacity, host platform (chipset, BIOS), and current free-space all materially affect reproducibility. (tomshardware.com)
- Community model lists are investigative leads, not vendor-validated recall lists. SSD vendors and controllers are deployed across many branded SKUs with different firmware and BOMs; vendor-level firmware differences can make two identically labeled drives behave differently.
Technical theory: what might be happening (current community hypothesis)
Several independent testers and engineers have converged on a plausible host/controller interaction model. The following is a synthesis of community analysis and vendor statements — not a confirmed root cause.- Windows update KB5063878 likely altered some host-side buffering or write-back behavior in the storage stack (such changes are plausible in quality/security rollups). (support.microsoft.com)
- Under sustained sequential write stress, the OS may hold a large amount of buffered data before issuing flush/FUA operations or applying backpressure to the I/O queue. This can let I/O queues grow in ways the SSD’s firmware does not expect. (tomshardware.com)
- When the SSD is already largely filled (reduced spare area), its SLC cache is effectively smaller, and the drive’s FTL (flash translation layer) ramps garbage collection and wear-leveling, greatly increasing write amplification. That raises controller load and latency. (tomshardware.com)
- The combination of heavy host write buffering and increased controller-side work can push the controller into a state where it hangs, resets, or stops responding to NVMe commands. When the controller stops responding, the host may treat the device as removed from the PCIe/storage topology. File-system metadata updates in-flight can be left incomplete, producing RAW volumes or corrupted NTFS/partition tables. (tomshardware.com, bleepingcomputer.com)
Timeline and vendor responses
- August 12, 2025: Microsoft releases KB5063878 (OS Build 26100.4946). The public KB initially lists no known storage issues. (support.microsoft.com)
- Within days: Community testers reproduce a reproducible failure mode where drives disappear during heavy writes; initial signals originate from users in Japan and hobbyist test benches.
- Mid-August 2025: Phison acknowledges it has been “made aware” of the issue and is investigating controllers that might be affected and working with partners; other vendors begin triage and some publish advisories. Microsoft says it is investigating with partners. (wccftech.com, tomshardware.com)
- Microsoft also addressed a separate WSUS/SCCM deployment error (0x80240069) linked to the same package via Known Issue Rollback (KIR) mitigations for enterprise channels. That installation problem was later resolved and Microsoft advised organizations to refresh/sync WSUS. (support.microsoft.com, neowin.net)
Practical impact and recovery scenarios
There are two general outcomes reported by users and testers:- Milder, more common outcome: Drive vanishes mid-write but recovers after reboot. The device reappears and basic SMART is readable again. Data that was being written at the moment of failure may be corrupted or incomplete, but the drive itself remains usable. (tomshardware.com)
- Severe, less common outcome: Drive does not return cleanly and partitions/metadata appear corrupted (RAW). In these cases SMART and controller telemetry may be unreadable, and the OS or BIOS might briefly not enumerate the device. Testers have sometimes recovered drives by rewriting partition tables (TestDisk) or performing full media erase / zero-fill from Linux tools, but that destroys user data. Some drives required vendor-level reflash or RMA. (bleepingcomputer.com, tomshardware.com)
Recommended actions for consumers and administrators
The situation demands pragmatic, risk-based choices for individuals and IT teams. The following recommendations synthesize community reproductions, vendor guidance, and Microsoft’s stance.Immediate steps (for any user)
- Back up critical data now. If you have not recently backed up, do this immediately before running heavy write workloads or attempting repairs. Backups are the only reliable defense against media corruption. (tomshardware.com)
- Check your Windows build: Settings > System > About will show your OS Build (KB5063878 corresponds to Build 26100.4946). If you are on that build and have any suspect drives, treat heavy writes with caution.
- Avoid sustained, large sequential writes (game updates, large archive extraction, cloning, mass media copies) until vendors publish firm guidance or firmware updates. Splitting transfers into smaller chunks or throttling copy operations may reduce risk. (tomshardware.com)
If your drive disappears mid-write
- Stop doing new writes to that drive immediately. Continued writes can worsen metadata damage. (bleepingcomputer.com)
- Reboot and check whether the drive reappears. If it does, run vendor tools to read SMART attributes and capture logs for vendor support. (tomshardware.com)
- If the device remains inaccessible, do not reformat. Image the raw device (dd or vendor imaging tools) if possible, capture vendor logs, and contact the SSD vendor for RMA/diagnostics. Attempting blanket reformatting risks permanent data loss. (bleepingcomputer.com)
For IT administrators and fleet operators
- Stage KB deployments in representative test rings that include the exact storage hardware used by your fleet, especially if using third-party SSDs with Phison controllers. (tomshardware.com)
- Hold large, automated write jobs (imaging, backups, content updates) on recently patched machines until vendor advisories or tested firmware are available. (tomshardware.com)
- Monitor Microsoft’s release health dashboard and vendor advisories and prepare to deploy SSD firmware updates via validated channels. Microsoft’s Known Issue Rollback (KIR) and traditional servicing controls may be applied for enterprise scenarios; follow Microsoft’s guidance for WSUS/SCCM if you use those systems. (support.microsoft.com, neowin.net)
What remediation will likely look like
Historically, incidents of this type have resolved through a combination of:- Controller vendor firmware updates that fix internal state-machine or DMA-handling edge cases. Controller vendors typically coordinate firmware with drive-brand partners before public distribution. Phison’s public statement indicates that this is their primary response path. (wccftech.com)
- Microsoft OS-side mitigations where necessary (patches, driver updates, or precisely scoped release rollbacks) if telemetry shows the host is contributing to unsafe behavior. (support.microsoft.com)
- Vendor advisories for end users (workarounds such as avoiding heavy sequential writes, or instructions for firmware updates). These will likely be distributed via drive-brand support pages and update utilities. (tomshardware.com)
Strengths and limitations of the evidence so far
Strengths
- Multiple independent reproductions by community testers and specialist hardware outlets produced a consistent symptom set and workload trigger, which elevates the reports above isolated anecdotes. (tomshardware.com, bleepingcomputer.com)
- A major controller supplier (Phison) has publicly acknowledged the investigation and committed to working with partners, which indicates vendors take the reports seriously and are cooperating on root cause analysis. (wccftech.com)
Limitations and open questions
- Microsoft’s official KB initially reported no known issues for KB5063878; while Microsoft now says it is investigating with partners, there is not yet a vendor-validated, public root-cause statement. That leaves room for competing hypotheses (controller firmware bug, host stack regression, BIOS/PCIe firmware interactions). (support.microsoft.com, tomshardware.com)
- Community model lists are heterogeneous and often conflate different firmware SKUs, capacities, and host configurations; this makes any definitive public “affected drive” list unreliable until vendors publish validated inventories.
- Some commentators caution that spontaneous drive failures do happen and correlation is not proof of causation; however, the reproducible workload pattern and clustering around certain controllers strengthen the suspicion of an update-triggered interaction rather than coincidence. Until forensic traces from controllers and OS logs are published, full confidence is impossible. (pcgamer.com, techradar.com)
How to monitor the situation (trusted signals to watch)
- Microsoft’s official KB/support and Windows release health dashboard for any Known Issue entries or mitigations to KB5063878. (support.microsoft.com)
- Official advisories and firmware downloads from SSD vendors and their brand partners (Crucial, Western Digital, Corsair, ADATA, SK hynix, etc.). (tomshardware.com)
- Phison’s partner advisories and firmware bulletins — Phison has publicly acknowledged the issue and said it will coordinate with partners. (wccftech.com)
- Reputable hardware outlets and specialist labs that reproduce tests (Tom’s Hardware, BleepingComputer, TechRadar, and others) for validated, repeatable test logs rather than forum hearsay. (tomshardware.com, bleepingcomputer.com, techradar.com)
Long-term lessons for Windows users and IT teams
This incident highlights three recurring truths about modern PC storage:- Modern storage is a co‑engineered system: OS, driver, firmware, BIOS/UEFI, and workload all matter. Small host-side timing or buffer changes can expose latent firmware bugs that stayed dormant until a particular stress pattern surfaced them. (tomshardware.com)
- Robust backup discipline is the least glamorous but most effective mitigation. When low-level storage metadata is at risk, backups (and images) are the only reliable recovery path. (tomshardware.com)
- Staged rollouts and representative test rings are essential for organizations. Fleet testing must include representative storage hardware and write workloads to catch these rare but high-impact regressions before broad deployment. (tomshardware.com)
Conclusion
The August 12, 2025 Windows 11 cumulative (KB5063878, OS Build 26100.4946) has been linked by multiple independent test benches and specialist outlets to a reproducible storage‑device regression that can make certain SSDs vanish during sustained heavy writes and risk data corruption. Phison has acknowledged it is investigating and Microsoft says it is working with partners. The evidence is strong enough to warrant immediate, conservative actions — foremost, backing up important data and avoiding sustained large writes on systems that received the update until vendors release validated firmware or guidance. (support.microsoft.com, tomshardware.com, wccftech.com)This remains an unfolding, technical investigation that will ultimately require coordinated telemetry and firmware patches to resolve the interplay between Windows’ storage stack and SSD controller firmware. Until vendors publish firm fixes and validated guidance, prioritize backups, stage updates, and treat any mid-write disappearance of a storage device as a potential data‑loss event requiring careful forensic handling. (tomshardware.com, bleepingcomputer.com)
Source: windowslatest.com Microsoft is investigating Windows 11 KB5063878 SSD data corruption/failure issue