Microsoft’s August cumulative for Windows 11 (KB5063878, OS Build 26100.4946) has been tied by multiple independent community tests and tech outlets to a serious storage regression: under sustained, large sequential writes some SSDs can stop responding, disappear from Windows, and — in a minority of reports — remain inaccessible after a reboot, potentially exposing written files to corruption or loss. (support.microsoft.com, notebookcheck.net, guru3d.com)
Microsoft released KB5063878 as the August 12, 2025 cumulative security and quality update for Windows 11 24H2 (OS Build 26100.4946). The official KB page lists the package contents and standard installation guidance but, at the time community reporting surfaced, did not list a storage-device failure as a known issue on the Microsoft support entry. (support.microsoft.com)
Within days of the rollout a cluster of community reproductions and specialist write-ups surfaced a consistent failure fingerprint: when performing heavy, continuous file writes — typically in the tens of gigabytes range (community tests commonly cite ~50 GB and above) — some drives abruptly stop responding, disappear from Device Manager and Disk Management, and present unreadable SMART/controller telemetry. In many cases a reboot restores visibility temporarily, but the condition can recur under the same workload; in a smaller subset of reports the drive remained inaccessible or exhibited signs of corruption after restart. (notebookcheck.net, igorslab.de)
This article summarizes the evidence collected so far, explains why the problem is technically plausible, evaluates the scope and quality of the reporting, flags unverified claims, and offers practical mitigations and investigatory steps for both consumers and IT administrators.
The good news is that historically these incidents are resolvable through coordinated vendor firmware updates or targeted OS mitigations. The cautionary reality is that such fixes require precise telemetry, vendor analysis, and careful packaging; until those appear, the prudent path for users and admins is conservative: back up, avoid risky writes, and stage updates.
Finally, early community testing is valuable and has historically accelerated vendor responses — but community lists and thresholds (the 50 GB number, the 60% controller load, specific model lists) are indicators, not immutable technical absolutes. Treat the numbers as practical heuristics for risk management, and watch for formal vendor or Microsoft advisories before drawing final conclusions about permanent hardware damage. (windowsforum.com)
Conclusion
The initial reports tying KB5063878 to SSD disappearances during heavy writes are credible, technically plausible, and supported by multiple independent reproductions — but they are not yet a finalized vendor-validated root cause across the entire market. Until vendors and Microsoft publish coordinated diagnostics and fixes, users who run sustained large writes or rely on DRAM‑less/Phison-based SSDs should act cautiously: back up, avoid large sequential transfers on recently patched systems, and prioritize firmware checks and staged update policies for critical endpoints. (support.microsoft.com, notebookcheck.net, igorslab.de)
Source: Tom's Hardware Latest Windows 11 security patch might be breaking SSDs under heavy workloads — users report disappearing drives following file transfers, including some that cannot be recovered after a reboot
Background / Overview
Microsoft released KB5063878 as the August 12, 2025 cumulative security and quality update for Windows 11 24H2 (OS Build 26100.4946). The official KB page lists the package contents and standard installation guidance but, at the time community reporting surfaced, did not list a storage-device failure as a known issue on the Microsoft support entry. (support.microsoft.com)Within days of the rollout a cluster of community reproductions and specialist write-ups surfaced a consistent failure fingerprint: when performing heavy, continuous file writes — typically in the tens of gigabytes range (community tests commonly cite ~50 GB and above) — some drives abruptly stop responding, disappear from Device Manager and Disk Management, and present unreadable SMART/controller telemetry. In many cases a reboot restores visibility temporarily, but the condition can recur under the same workload; in a smaller subset of reports the drive remained inaccessible or exhibited signs of corruption after restart. (notebookcheck.net, igorslab.de)
This article summarizes the evidence collected so far, explains why the problem is technically plausible, evaluates the scope and quality of the reporting, flags unverified claims, and offers practical mitigations and investigatory steps for both consumers and IT administrators.
What users are reporting — symptoms and reproducibility
Core symptom profile
- The drive disappears from Windows (File Explorer, Device Manager, Disk Management) mid-write.
- SMART and controller data become unreadable to host utilities.
- Rebooting the system sometimes restores device visibility; the issue frequently reappears when the same heavy write workload is applied.
- Files in-progress when the fault occurs may be incomplete or corrupted; in rare user reports the drive does not return to service without vendor intervention. (notebookcheck.net, guru3d.com)
Typical trigger workload
Community tests converge on a reproducible pattern: sustained sequential writes — large game updates, mass file copies, archive extraction, or disk-cloning operations — are the common trigger. Testers often report a threshold in the region of ~50 GB and above, and note controller utilization spikes (e.g., ~60% or higher) during repro. That workload profile stresses the drive’s cache, metadata updates, and host/OS buffer paths simultaneously. (igorslab.de, windowsforum.com)Which drives are implicated so far
Early, community-compiled lists and hands-on reproductions repeatedly highlight drives using Phison controller families — particularly some DRAM-less configurations — but the phenomenon is not strictly limited to Phison-based products. Branded models called out across different reports include Corsair MP600 (and other E12/E16 variants), Kioxia Exceria Plus G4, SanDisk Extreme Pro M.2 NVMe 3D, and several third-party OEM drives. Additional follow-ups mention WD Blue SN5000, WD Red SA500, Crucial P3 Plus and others in mixed recovery profiles (some recover after reboot, others do not). These lists are community-sourced and should be treated as investigative leads, not definitive recall inventories. (guru3d.com, igorslab.de)Why this is technically plausible
The reported behavior matches known failure modes where host-side changes in buffering, NVMe driver timing, or HMB allocations expose latent firmware bugs in SSD controllers:- NVMe Host Memory Buffer (HMB) lets DRAM-less SSDs borrow host RAM for caching. That creates tight coupling between the OS, NVMe driver, and controller firmware. Changes in how Windows allocates or manages HMB, or subtle timing/regression in the kernel I/O path, can push certain firmware code paths into unexpected states. Historical 24H2-era incidents (HMB-related BSODs and instability) demonstrate how an OS change can reveal firmware edge cases.
- Sustained sequential writes exercise the controller’s metadata and garbage-collection behavior. If the controller firmware encounters an unhandled condition (e.g., a command ordering or resource exhaustion scenario), it may “lock up” or become non-responsive. The OS then treats the device as removed from the PCIe topology, resulting in the drive vanishing from the system and SMART data becoming unreadable. (guru3d.com, windowsforum.com)
- The pattern of temporary recovery after reboot but recurrent failure under the same workload strongly suggests a timing or resource edge case rather than wholesale physical flash die failure in most instances. That said, a firmware crash triggered repeatedly can corrupt controller metadata and may lead to persistent data loss in the worst case. (igorslab.de, notebookcheck.net)
How reliable is the evidence?
Strengths
- Multiple independent community testers reproduced a consistent set of symptoms across different platforms and drives, which increases credibility relative to isolated anecdote. Outlets that aggregated those tests (enthusiast sites and hardware bloggers) produced reproducible trigger procedures and model lists used for follow-up testing. (notebookcheck.net, guru3d.com)
- The technical profile of the failure (HMB/DRAM-less controller sensitivity, sustained sequential writes) aligns with established storage failure patterns previously documented in the Windows 11 24H2 lifecycle. That makes the reported behavior plausible and not an implausible attribution.
Limitations and gaps
- There is no single authoritative vendor or Microsoft bulletin (at the time of the early reports) that universally confirms KB5063878 as the definitive root cause across all affected models. Microsoft’s official KB for KB5063878 initially listed no known storage-related issues. That absence matters: vendor telemetry and Microsoft-sourced diagnostics are required to establish causation and to coordinate fixes. (support.microsoft.com)
- The community model lists are useful signals but suffer from sampling bias: they focus on enthusiasts who run heavy writes and do forensic testing. Many consumer systems with lighter workloads may never reproduce the fault, so incidence across the installed base remains uncertain.
- Some headlines have used words like “destroy” or “permanently bricked” which overstate the established evidence. While some users report non-recoverable drives after the event, the majority of community reproductions show temporary disappearance and recurrence rather than guaranteed hardware death. Those worst-case accounts are serious and deserve attention, but they are less well-correlated and require vendor analysis to separate firmware-corruption-driven permanent loss from coincident hardware failures. Flagging those scenarios as high-risk but not universally confirmed is the responsible position. (ghacks.net, overclock3d.net)
Immediate practical guidance (consumer and IT admin checklists)
The guidance below synthesizes community mitigations, vendor best practices, and Microsoft update mechanics.For consumers and power users
- Pause heavy writes: If you installed KB5063878 (or KB5062660 preview builds) and your system uses an NVMe/SSD for important data, postpone large sequential transfers (game installs/updates, bulk media copies, disk cloning) until the situation is clarified. Community reproduce windows commonly cite ~50 GB sustained writes as the trigger. (notebookcheck.net)
- Back up now: If a drive shows instability, back up all accessible data immediately to a known-good device or cloud storage. Avoid repeating risky write workloads on the suspect drive.
- Check firmware and vendor tools: Run your SSD vendor’s dashboard (e.g., Corsair/NVMe Toolbox, WD Dashboard, Crucial Storage Executive) to check firmware version and SMART status, and follow vendor instructions for firmware updates. Historically, firmware patches have resolved similar controller edge cases. Do not update firmware without a backup and follow vendor steps carefully.
- Capture diagnostics if you can: If the failure reproduces, capture Event Viewer logs (Windows Logs → System) around the time of the incident and save vendor diagnostic logs; they help vendors and Microsoft diagnose root cause. Avoid repeated reboots that may further write to the device.
- Avoid uninstall shortcuts unless you understand the risks: Removing a combined LCU+SSU package is non-trivial. Microsoft’s KB notes that the servicing stack (SSU) inclusion can restrict removal methods and suggests using DISM /Remove-Package with the exact LCU package name for removal; follow official guidance carefully. (support.microsoft.com)
For IT administrators and enterprise
- Inventory endpoints for exposed devices (DRAM-less NVMe, Phison families, the community model lists).
- Hold deployment of KB5063878 to sensitive fleets until vendor/Microsoft guidance is available or until you can test firmware-validated platforms.
- Use WSUS/SCCM controls and deployment rings to stage updates; note that KB deployment via WSUS/SCCM reportedly encountered error 0x80240069 in some environments earlier in the rollout, and Microsoft applied mitigations for that distribution problem. Monitor Windows Update Agent logs for related errors. (windowslatest.com)
- Temporary registry mitigation (emergency, not a fix): Community-sourced emergency mitigations used previously involve adjusting HMB allocation policies via registry keys (e.g., HmbAllocationPolicy under storport/stornvme parameter locations). This reduces or disables HMB behavior and may stop the symptom in DRAM-less drives, but it reduces performance and is not a long-term fix. Treat such edits as emergency stopgaps only and document changes for rollback. (windowsforum.com)
How to confirm whether the update is installed and (if necessary) remove it safely
- To check whether KB5063878 is installed: run winver.exe (should show build 26100.4946) or check Settings → Windows Update → Update history. Microsoft’s KB page documents the package and includes file lists. (support.microsoft.com)
- To remove the LCU: Microsoft’s KB entry explains that because the combined package includes the servicing stack update (SSU), normal wusa.exe uninstall options might not work — instead, the LCU package name must be identified and the DISM /Remove-Package command used. Follow Microsoft’s documented steps and ensure you have backups before attempting removal. Uninstalling OS servicing packages on production machines can have side effects; coordinate with support or a sysadmin. (support.microsoft.com)
Vendor and Microsoft response — where things stand (early picture)
- Microsoft’s KB page for KB5063878 lists the update details, but at the initial community reporting juncture did not identify the storage disappearance scenario as a known issue; Microsoft independently addressed a separate WSUS/SCCM deployment error (0x80240069) via servicing controls. That divergence (quick acknowledgement for enterprise install errors versus no initial storage known-issue entry) left community researchers to carry out hands-on reproducibility tests and to contact vendors. (support.microsoft.com, windowslatest.com)
- SSD vendors at the time of early reporting had not issued a uniform cross-vendor bulletin explicitly linking KB5063878 to specific firmware faults in all listed models. Some vendors historically release targeted firmware updates when telemetry reveals controller faults; others require a clear, reproducible trigger pattern and vendor-side logs to issue a patch. The absence of a consolidated cross-vendor advisory means follow-up confirmatory work and coordinated firmware/driver fixes may take time. Community testing and vendor telemetry will determine whether fixes arrive via vendor firmware or a Microsoft servicing update. (igorslab.de)
Technical risk assessment — who should be most concerned
- High concern: Users and professionals who routinely perform large sequential writes to NVMe/SSDs (gamers updating large games, video editors exporting large projects, backup/cloning operations). Their workflows match the reported trigger patterns and thus have elevated exposure. (notebookcheck.net)
- Moderate concern: Systems using DRAM-less NVMe SSDs, particularly those with Phison-family controllers, which were overrepresented in early reproductions. These drives are more reliant on HMB and therefore more sensitive to host-side memory allocation behavior. (igorslab.de)
- Lower concern: Casual users who rarely execute sustained tens-of-gigabytes sequential writes; many such users may never observe the fault. Still, the presence of recovery-edge cases means prudent backup hygiene is always warranted.
Recommended step-by-step checklist (concise)
- Verify: Run winver.exe or Settings → About to confirm your build (26100.4946 = KB5063878). (support.microsoft.com)
- Backup: Copy critical data to another drive or cloud immediately if the suspect SSD is accessible.
- Avoid heavy writes: Don’t install large games, compress/extract big archives, or run bulk backups to the drive until you have guidance. (notebookcheck.net)
- Check firmware: Run vendor dashboard/tools and update firmware if a vendor advisory exists. Back up before flashing.
- Capture logs: If you see the fault, save Event Viewer logs and SMART output (smartctl/CrystalDiskInfo) and stop further writes.
- If managing fleets: Pause broad KB deployment in pilot rings; require firmware confirmation before upgrading exposed endpoints; use WSUS/SCCM controls to stage rollout. (windowslatest.com)
Long view and closing analysis
Windows and storage ecosystems are tightly coupled: OS buffering policies, NVMe driver behavior, and SSD controller firmware must work in concert. When a widely distributed OS update subtly changes timing or resource allocation, latent controller bugs can surface — sometimes only under demanding workloads. The KB5063878 reports fit that pattern: reproducible symptoms under sustained writes, an over-representation of certain controller families in community tests, and a mix of recoverable and unrecoverable outcomes. (igorslab.de)The good news is that historically these incidents are resolvable through coordinated vendor firmware updates or targeted OS mitigations. The cautionary reality is that such fixes require precise telemetry, vendor analysis, and careful packaging; until those appear, the prudent path for users and admins is conservative: back up, avoid risky writes, and stage updates.
Finally, early community testing is valuable and has historically accelerated vendor responses — but community lists and thresholds (the 50 GB number, the 60% controller load, specific model lists) are indicators, not immutable technical absolutes. Treat the numbers as practical heuristics for risk management, and watch for formal vendor or Microsoft advisories before drawing final conclusions about permanent hardware damage. (windowsforum.com)
Conclusion
The initial reports tying KB5063878 to SSD disappearances during heavy writes are credible, technically plausible, and supported by multiple independent reproductions — but they are not yet a finalized vendor-validated root cause across the entire market. Until vendors and Microsoft publish coordinated diagnostics and fixes, users who run sustained large writes or rely on DRAM‑less/Phison-based SSDs should act cautiously: back up, avoid large sequential transfers on recently patched systems, and prioritize firmware checks and staged update policies for critical endpoints. (support.microsoft.com, notebookcheck.net, igorslab.de)
Source: Tom's Hardware Latest Windows 11 security patch might be breaking SSDs under heavy workloads — users report disappearing drives following file transfers, including some that cannot be recovered after a reboot