Microsoft has acknowledged an active investigation after multiple community researchers, test benches and SSD vendors reported that the Windows 11 August cumulative (commonly tracked as KB5063878, OS Build 26100.4946) can cause certain SSDs to vanish from the operating system during sustained, large sequential writes — a failure mode that can truncate or corrupt files and, in a minority of reports, leave a drive inaccessible without vendor-level intervention. rumulative update for Windows 11 24H2 on August 12, 2025 as part of regular Patch Tuesday servicing. The package was intended to deliver security and quality improvements, but within days a cluster of reproducible reports surfaced: during sustained large writes (commonly reproduced at roughly 50 GB of continuous sequential writes) some storage devices stop responding and disappear from File Explorer, Device Manager and Disk Management. Reboots often restore visibility, but files being written at the moment of failure can be truncated or corrupted.
SSD controller supplier Phison publastry‑wide effects” linked to the updates and said it was coordinating with partners. Microsoft told press it was “aware of these reports and investigating with our partners.” Those vendor and platform acknowledgements elevated the issue beyond forum anecdotes into an active, cross‑industry troubleshooting effort.
Practical, immediate actions ack up critical data, avoid large sequential writes on recently updated systems, check vendor firmware advisories, and image affected drives before attempting repairs. For organizations, pause broad deployment where representative storage hardware hasn’t been valtes through a pilot ring that exercises heavy-write workloads.
This remains an active, evolving incident that underscores a persistent truth: Windows servicing changes can surface deep, fragile dependencies in storage stacks. Coordinated telemetry, vendor firmware patches and careful staging are the right path to a stable resolution — but until vendors and Microsoft publish verified remediation, the safest posture is conservative and backup-focused.
Source: PCMag UK Microsoft Investigating Reports of SSDs Vanishing After Latest Windows 11 Update
SSD controller supplier Phison publastry‑wide effects” linked to the updates and said it was coordinating with partners. Microsoft told press it was “aware of these reports and investigating with our partners.” Those vendor and platform acknowledgements elevated the issue beyond forum anecdotes into an active, cross‑industry troubleshooting effort.
What users and testers are reporting
Symptom profile — what vanishes uite begins normally (examples: large game update, disk clone, archive extraction) and then abruptly fails after tens of gigabytes are written, commonly near the ~50 GB mark.
- The target SSD becomes unresponsive and disappears from the OS topology — it may not appear in File Explorer, Device Manager or Disk Management.
- Vendor utilities and SMART telemetry often stop responding or return unreadable attributes after the event.
- In many cases restores the drive; in a smaller subset of incidents the device remains inaccessible and the partition may show as RAW, or files written during the failure window are corrupted or truncated.
Reproducibility and workload triggers
Independent hobbyist labs and specialist outlets reproduced a consistent failure profile under a narrow sequential writes on the order of ~50 GB or more, especially on drives that were already substantially filled (community reports commonly flagging >50–60% used capacity). This suggests the bug is workload-sensitive** rather than a random hardware fluke.Observed scale and distribution
- The reports are concentrated among enthusiast communities, independent test benches and a range of consumer drives. They are notma universal failure across all SSDs or all machines.
- Community collations indicate clusters around certain controller families and DRAM‑less NVMe designs, but model lists remain provisional and should be treated as investigative leads rather than definitive blacklists.
Who’s involved: Microsoft, Phison, and the community
Microsoft
Microsoft confirmed it is investigating reports and has been working with partners to identify root causes. The vendor also published ees for other August regressions (notably reset/recovery regressions), illustrating how multiple servicing issues were tracked concurrently during the same update cycle.SSD controller vendors
Phison — a major SSD controller supplier — publicly acknowledged it was investigating the effects of the August updates that “potentially impacted several storage devices,” and said it was coordinating withhat acknowledgement accelerated analysis because many consumer drives use Phison controllers, and vendor-level telemetry is required to confirm whether firmware interactions are implicated.Community researchers and specialist outlets
Multiple independent hardware outlets and enthusiastic test benches performed controlled reproductions and collated user reports; their early, repeatable findings are the reason the incident escalated quicent. Those tests remain the primary evidence for the workload trigger profile and the practical mitigation steps recommended to users today.Technical analysis — plausible mechanisms
The pattern of failures reported by testers and vendors points to an interaction between the Windows host storage stack and SSD controller firmware under a sustained I/O stress profile. Several plausible technical mechanismsnd observed in prior incidents:- Controller firmware lockups: NVMe controllers run complex firmware to manage SLC caching, garbage collection and wear‑leveling. Under long sequential writes the controller may be driven into corner cases that it cannot safely handle, causing it to stop responding to host commands and appear to the OS as if it had vanished. This aligns with the abrupt loss of SMART/controller telemetry observed by testers.
- Host Memory Buffer (HMB) and DRAM‑less drives: DRAM‑less SSDs can rely on the host for metadata via HMB. Changes in host allocation timing introduced by OS updates can destabilize these drives’ metadata handling under heavy write pressure, particularly when SLC caches are exhausted and bacs required. Previous Windows 11 24H2 interactions with DRAM‑less designs produced similar symptoms, and community analyses point to HMB timing as a plausible contributing factor.
- PCIe/Chipset/Platform timing effects: OS-level changes in command submission, queue depth handling, or DMA scheduling can alter the timing seen by controllers. A subtle timing regression on the host can expose latent firmware races in a narrow set of controllers. Several independent commentaries emphasize that d failure space — OS and firmware must be considered together.
- Workload sensitivity (SLC caching exhaustion): Heavily sustained sequential writes deplete fast SLC caches and force the drive to write directly to NAND with concurrent garbage collection. If firmware has unhandled states when the host retains particular behavior, the controller may lock or misreport metadata, producing the disappeaat: these mechanisms are plausible and consistent with community reproductions, but conclusive root cause attribution requires vendor telemetry and cross‑vendor forensic logs. At the time of reporting the investigation was ongoing and no single public, definitive engineering post‑mortem had been published.
Risks and practical consequences
- ** Files being written when a drive becomes unresponsive are at material risk of truncation or corruption. The incident therefore represents more than a temporary nuisance; it can be a data‑loss event for active transfers.
- Drive availability: While most affected devices return after a reboot, a minority of cat remain inaccessible, require firmware reflashes, or present RAW partitions that need reformatting — scenarios that can produce permanent data loss without backups.
- Operational impact for gamers and creators: Large patch downloads, game installations and bulk media transfers are cloads that can reproduce the fault, which is why many early reports came from gamers and content creators. Systems performing large writes (backups, cloning) are similarly at risk.
- Fleet management complexity: Organizations that roll updates broadly without representative htesting risk exposing a small but consequential subset of systems to potential data-loss events. The incident underlines the importance of test rings that include real-world storage hardware and heavy-write workloads.
What to do now — step-by-step guidance for users and admins
The community’s practical guidance coive, evidence-based set of immediate actions. The following numbered steps summarize a defensible response plan.- Back up critical data immediately from any machine that installed the August update or KB5063878. Backups are the only reliable line of defense against metadata-level or partition damage.
- Avoid sustained, large sequ) on systems that received the update until vendors provide validated firmware or Microsoft publishes a mitigation. That includes deferring large game installs, archive extractions and disk cloning tasks.
- If you’ve experienced a drive disappearance, stop writing to the drive, capture logs (Event Viewer, driver logs), and create a sector image if data is valuable before attempting repairs or reformatting. Imaging preservesdiagnostics and increases chances of recovery.
- Check SSD vendor utilities for firmware updates and advisories. Apply vendor firmware only after imaging and after ensuring the firmware targets the reported issue. Vendor tools can also surface SMART and controform diagnosis.
- For managed environments, stage the update in a pilot ring that specifically includes representative storage hardware and stress tests that simulate large sequential writes before broad deployment. Consider blocking the update temporarily where the risk profile is unacceptal back the update (if necessary)
- Windows allows uninstalling recent cumulative updates through Settings → Windows Update → Update history → Uninstall updates. For enterprise environments, remediation via WSUS/SCCM controls and Known Issue Rollback (KIR)icable. Organizations should coordinate with vendor guidance and prioritize devices with at-risk storage hardware.
Recovery and forensic steps for affected drives
- If the drive returns after reboot, immediately create a full sector image before further writes. This preservr diagnostics and increases the chance of recovering partially written files.
- If a drive is inaccessible, avoid reformatting or initializing it without creating a forensic image first. Many recovery tools and vendor services depend on an unaltered image.
- Engage vendor support with logs and images if data is critical. Vendors can sometimes reflash firmware, perform controller-level resets, or advise recovery paths.
- In production environments, treat any mid‑write drive disappearance as a potential data-loss incident requiring formal incident response: isolate the host, preserve logs, and escalate to vendor engineering teams where necessary.
What vendors and Microsoft are doing (so far)
- Microsoft publicly acknowledged the investigation and engaged with partners to identify scope and impact. Microsoft also pushed targeted out-oer in the same cycle to address other servicing regressions.
- Phison and other controller vendors opened investigations and coordinated with OEMs and drive brands to gather telemetry and test reproductions. Vendor firmware updates and advisories are the most likely remediation route if controller behavior is the root cause.
- Specialist outlets and community test benches published reproducible test sequences and ts; vendors are using those leads to prioritize forensic validation and firmware triage. Community lists are useful for triage but remain provisional pending vendor verification.
Critical evaluation — strengths and gaps in current reporting
Strengths
- The community t rigorous: independent labs converged on a consistent workload profile (sustained sequential writes) and a consistent symptom set, which is strong evidence for a real host–controller interaction rather than mere coincidence.
- Vendor acknowledgement (Phison) and Micove the issue from anecdote to an industry investigation, making remediation via firmware and OS updates plausible.
Gaps and Unverifiable Claims
- Publicly available evidence at this stage is largely community-sourced and vendor-confirmation is limited to acknowledgement of investigattative engineering post‑mortem that ties the regression to a specific code path, driver or firmware condition had not been published at the time the community collations were compiled; therefore definitive root-cause attribution remains unverified. This must be explicitly emphasized: community reproducibility is strong evidence, but it is not theted forensic proof.
- Model lists compiled from user reports are useful but inherently noisy: firmware revision, OEM assembly, platform chipset, BIOS/UEFI and even thermal condite whether a given drive reproduces the fault. Treat those lists as investigative leads, not a final compatibility matrix.
Longer-term implications and lessons
- This incident reiterates that modern storage reliability is a co‑engineered property: OS updates, driver behavior, SSD controller firmware and platform firmware (BIOS/UEFI) all interact. Small changes in host timing or resource allocation can expose latent firmware bugs that manifest only under specific workloads.
- For IT teams and system integrators, the practical takeaway is to *test with representative hardespecially when rolling updates that may affect low-level I/O behavior. Test rings must include heavy-write scenarios (large installs, cloning, backup/restore) to catch these edge cases before broad deployment.
- For consumers, the incident reinforces the baseline best practice: keep good, recent bacing critical heavy-write operations immediately after installing system updates until vendor guidance confirms the build is safe for those workloads.
Conclusion
The reports that Windows 11’s August cumulative (KB5063878) can cause some SSDs to vanish during sustained heavy writes are backed by repeatable community tests and vendor acknowledgement that an way. The failure signature — disappearance during prolonged sequential writes commonly around the ~50 GB mark and with drives already substantially used — points to an interaction between Windows’ storage behavior and SSD controller firmware, though a final root cause remained under forensic review.Practical, immediate actions ack up critical data, avoid large sequential writes on recently updated systems, check vendor firmware advisories, and image affected drives before attempting repairs. For organizations, pause broad deployment where representative storage hardware hasn’t been valtes through a pilot ring that exercises heavy-write workloads.
This remains an active, evolving incident that underscores a persistent truth: Windows servicing changes can surface deep, fragile dependencies in storage stacks. Coordinated telemetry, vendor firmware patches and careful staging are the right path to a stable resolution — but until vendors and Microsoft publish verified remediation, the safest posture is conservative and backup-focused.
Source: PCMag UK Microsoft Investigating Reports of SSDs Vanishing After Latest Windows 11 Update