How Toshiba & Kioxia SSDs Fail
Toshiba/Kioxia SSDs use two distinct controller ecosystems, and the failure mode depends on which one your drive has. OEM drives (XG5, XG6, XG7, XG8, BG4, BG5) use Toshiba's in-house TC58NC controllers with proprietary firmware & FTL structures. Retail drives (Exceria, Exceria Plus, Exceria Pro) use Phison controllers (E12C, E12S, E18) with Phison firmware. Recovery tools & procedures differ between these two families.
Both families use Toshiba/Kioxia's BiCS FLASH NAND. BiCS is Toshiba's 3D NAND architecture, stacking cell layers vertically. Older drives (XG5, TR200) use BiCS3 64-layer TLC. Current drives (XG8, BG6) use BiCS6 162-layer TLC. Higher layer counts increase storage density per die but tighten voltage margins between cell states, affecting long-term data retention & read reliability.
The encryption layer complicates NVMe recovery. XG series OEM drives support TCG Opal 2.0 with AES-256 encryption keys bound to the controller. Kioxia Exceria NVMe drives use Phison's AES-256 implementation, where the Media Encryption Key is wrapped by a silicon-unique root key on the Phison controller. If the controller dies, chip-off yields only ciphertext.
What Are the Known Toshiba & Kioxia SSD Problems?
Toshiba/Kioxia SSD failures cluster around specific controller generations & OEM deployment patterns. The XG series OEM drives account for the majority of cases we see, because Dell, HP, & Lenovo shipped millions of them in business laptops between 2018 and 2024.
XG5 & XG6 Firmware Corruption After Power Loss
The XG5 & XG6 use Toshiba's proprietary TC58NC-series controllers, which are vulnerable to firmware table corruption during unexpected shutdowns. The FTL mapping becomes inconsistent, and the controller either reports 0 MB capacity or refuses to initialize entirely. BIOS shows the drive model string but with zero capacity. These drives lack power-loss protection capacitors found in enterprise models, making laptop hard shutdowns a common trigger. Because these proprietary controllers lack deep firmware utility modules, recovery relies on component-level board repair to revive the original controller for imaging through the native decryption path.
BG4 & BG5 BGA Package Thermal Failure
The BG4 (KBG40ZNS) & BG5 (KBG50ZNS) are single- package BGA SSDs measuring 16mm x 20mm. Controller, NAND, and DRAM share one substrate. In fanless or poorly ventilated ultrabooks, sustained thermal cycling causes solder joint stress between the BGA package & the motherboard. The drive intermittently disconnects, then permanently drops off the NVMe bus. FLIR thermal imaging identifies the fault point on the BGA substrate, and Zhuo Mao precision BGA rework addresses the connection failure.
Exceria & Exceria Plus Phison E12C Firmware Hang
The Kioxia Exceria (Gen3) & Exceria Plus (Gen3) use a rebranded Phison PS5012-E12C controller, marketed as TC58NC1202GST on the package. The E12C has a known failure pattern where the controller hangs during firmware module loading after unexpected power loss. The drive appears in BIOS with its model name but reports zero capacity or enters Phison's safe mode. PC-3000 SSD's Phison E12 utility accesses the controller below the firmware layer to rebuild the FTL & extract data.
Exceria Pro Phison E18 PMIC Failure
The Kioxia Exceria Pro uses the Phison PS5018-E18 Gen4 NVMe controller with AES-256 hardware encryption. A common failure pattern is PMIC (power management IC) death from voltage spikes during hot-plug events or PSU instability. The drive goes completely dead; BIOS doesn't detect it. FLIR thermal imaging identifies the shorted PMIC on the PCB. Board repair using a Hakko FM-2032 replaces the failed component, restoring power to the E18 controller so it can decrypt & serve data. NVMe board repair: $600–$900.
TR200 & OCZ TR150 SATA Controller Death
Toshiba's SATA SSDs (TR200, OCZ TR150, OCZ VX500) used Phison S11 & S10 controllers paired with BiCS3 64-layer TLC NAND. The SATAFIRM S11 firmware bug is a known failure where the Phison S11 controller reports its model string as "SATAFIRM S11" instead of the drive's actual model name, with zero capacity. PC-3000 SSD's Phison SATA utility rebuilds the firmware modules. SATA firmware recovery: $600–$900.
XG7 & XG8 Sleep/Resume NVMe Timeout
The XG7 (KXG70ZNV) & XG8 (KXG80ZNV) use updated TC58NC controllers with BiCS5/BiCS6 NAND. A reported failure pattern involves NVMe power state transitions (PS3/PS4) during laptop sleep/resume cycles. The controller loses its firmware context during an aggressive ASPM (Active State Power Management) transition & wakes with corrupted runtime state. The drive reports an incorrect capacity or fails to enumerate on the PCIe bus. When these proprietary controllers fail, recovery requires component-level electrical repair to revive the native hardware for imaging through the decryption path.
How Much Does Toshiba & Kioxia SSD Recovery Cost?
Toshiba/Kioxia SATA SSD recovery (TR200, OCZ TR150) ranges from $200 for a simple data copy to $1,200–$1,500 for NAND swap with microsoldering. NVMe recovery (XG5, XG6, XG7, XG8, Exceria, BG4, BG5) ranges from $200 to $1,200–$2,500. Free evaluation, firm quote before paid work, and no data means no charge.
Toshiba/Kioxia SATA SSD Pricing (TR200, OCZ Series)
Simple Copy
Low complexityYour drive works, you just need the data moved off it
$200
3-5 business days
Functional drive; data transfer to new media
Rush available: +$100
File System Recovery
Low complexityYour drive isn't showing up, but it's not physically damaged
From $250
2-4 weeks
File system corruption. Visible to recovery software but not to OS
Starting price; final depends on complexity
Circuit Board Repair
Medium complexityYour drive won't power on or has shorted components
$450–$600
3-6 weeks
PCB issues: failed voltage regulators, dead PMICs, shorted capacitors
May require a donor drive (additional cost)
Firmware Recovery
Medium complexityMost CommonYour drive is detected but shows the wrong name, wrong size, or no data
$600–$900
3-6 weeks
Firmware corruption: ROM, modules, or system files corrupted
Price depends on extent of bad areas in NAND
PCB / NAND Swap
High complexityYour drive's circuit board is severely damaged and requires NAND chip transplant to a donor PCB
$1,200–$1,500
4-8 weeks
NAND swap onto donor PCB. Precision microsoldering and BGA rework required
50% deposit required; donor drive cost additional
50% deposit required
Hardware Repair vs. Software Locks
Our "no data, no fee" policy applies to hardware recovery. We do not bill for unsuccessful physical repairs. If we replace a hard drive read/write head assembly or repair a liquid-damaged logic board to a bootable state, the hardware repair is complete and standard rates apply. If data remains inaccessible due to user-configured software locks, a forgotten passcode, or a remote wipe command, the physical repair is still billable. We cannot bypass user encryption or activation locks.
No data, no fee. Free evaluation and firm quote before any paid work. Full guarantee details. NAND swap requires a 50% deposit because donor parts are consumed in the attempt.
Rush fee: +$100 rush fee to move to the front of the queue.
Donor drives: A donor drive is a matching SSD used for its circuit board. Typical donor cost: $40–$100 for common models, $150–$300 for discontinued or rare controllers.
Target drive: The destination drive we copy recovered data onto. You can supply your own or we provide one at cost plus a small markup. All prices are plus applicable tax.
+$100 rush fee to move to the front of the queue. A donor drive is a matching SSD used for its circuit board. Typical donor cost: $40–$100 for common models, $150–$300 for discontinued or rare controllers.
Toshiba/Kioxia NVMe SSD Pricing (XG, BG, Exceria Series)
Simple Copy
Low complexityYour NVMe drive works, you just need the data moved off it
$200
3-5 business days
Functional drive; data transfer to new media
Rush available: +$100
File System Recovery
Low complexityYour NVMe drive isn't showing up, but it's not physically damaged
From $250
2-4 weeks
File system corruption. Visible to recovery software but not to OS
Starting price; final depends on complexity
Circuit Board Repair
Medium complexityYour NVMe drive won't power on or has shorted components
$600–$900
3-6 weeks
PCB issues: failed voltage regulators, dead PMICs, shorted capacitors
May require a donor drive (additional cost)
Firmware Recovery
Medium complexityMost CommonYour NVMe drive is detected but shows the wrong name, wrong size, or no data
$900–$1,200
3-6 weeks
Firmware corruption: ROM, modules, or system files corrupted
Price depends on extent of bad areas in NAND
PCB / NAND Swap
High complexityYour NVMe drive's circuit board is severely damaged and requires NAND chip transplant to a donor PCB
$1,200–$2,500
4-8 weeks
NAND swap onto donor PCB. Precision microsoldering and BGA rework required
50% deposit required; donor drive cost additional
50% deposit required
Hardware Repair vs. Software Locks
Our "no data, no fee" policy applies to hardware recovery. We do not bill for unsuccessful physical repairs. If we replace a hard drive read/write head assembly or repair a liquid-damaged logic board to a bootable state, the hardware repair is complete and standard rates apply. If data remains inaccessible due to user-configured software locks, a forgotten passcode, or a remote wipe command, the physical repair is still billable. We cannot bypass user encryption or activation locks.
No data, no fee. Free evaluation and firm quote before any paid work. Full guarantee details. NAND swap requires a 50% deposit because donor parts are consumed in the attempt.
Rush fee: +$100 rush fee to move to the front of the queue.
Donor drives: A donor drive is a matching SSD used for its circuit board. Typical donor cost: $40–$100 for common models, $150–$300 for discontinued or rare controllers.
Target drive: The destination drive we copy recovered data onto. You can supply your own or we provide one at cost plus a small markup. All prices are plus applicable tax.
+$100 rush fee to move to the front of the queue. A donor drive is a matching SSD used for its circuit board. Typical donor cost: $40–$100 for common models, $150–$300 for discontinued or rare controllers.
How Do We Recover Data from Toshiba & Kioxia SSDs?
Toshiba/Kioxia SSD recovery follows a four-step process: identify the controller family (TC58NC in-house vs. Phison), stabilize the controller, image data through the original encryption path, and verify file integrity. The first step is critical because the PC-3000 SSD module & recovery procedure differ between the two controller ecosystems.
- 01
Identify the controller family
We connect the drive to PC-3000 SSD & identify whether it uses a Toshiba TC58NC in-house controller (XG/BG series) or a Phison controller (Exceria, TR200). The model number on the drive label determines the family: KXG (XG series), KBG (BG series), LRC (Exceria). If the controller doesn't respond, we use a FLIR thermal camera to scan the PCB for shorted PMICs or voltage regulators.
- 02
Repair or stabilize the controller
For Phison-based drives (Exceria, TR200), the Phison utility module in PC-3000 SSD accesses the controller below the firmware layer. For TC58NC controllers (XG/BG series), firmware utility support is limited, so recovery relies on component-level board repair. For hardware failures on either family (shorted PMICs, dead voltage regulators), we replace the failed component using a Hakko FM-2032 on an FM-203 base station. The goal: get the original controller running so its AES-256 decryption engine is operational.
- 03
Image through the decryption path
With the controller operational, PC-3000 SSD reads data sector-by-sector through the hardware decryption layer. The controller decrypts each read in real time. For drives with degraded BiCS NAND, we apply hardware read-retry parameters that shift voltage thresholds to compensate for cell charge drift in TLC cells that have exceeded their rated program/erase cycles.
- 04
Verify & deliver
File system analysis extracts the directory structure & verifies individual file integrity. We provide a file listing before you approve the recovery. Data is returned on your choice of media via nationwide mail-in service. All work is performed in-house at our Austin, TX lab.
Can Recovery Software Fix a Toshiba or Kioxia SSD?
Recovery software works on Toshiba/Kioxia SSDs with logical failures only: accidental deletion (with TRIM disabled), partition table corruption, or an accidentally formatted volume. The drive must be physically healthy, detected in BIOS, and responding to read commands. Software can't fix a dead controller, corrupted firmware, or degraded NAND.
Disk Drill, EaseUS, PhotoRec, and R-Studio work for logical recovery on healthy SSDs. But they issue thousands of read commands across the entire drive. On a Toshiba/Kioxia SSD with degrading BiCS NAND, each read stresses cells that are already failing. The controller's internal retry logic adds heat & electrical stress. Background garbage collection may trigger, permanently erasing blocks the controller has marked as stale.
TRIM is the dividing line. On a modern SSD with TRIM enabled (the default on Windows 7+ and macOS 10.6.8+), deleted files are unrecoverable within seconds to minutes. The operating system tells the controller which blocks are no longer needed, and the controller unmaps those logical addresses & schedules garbage collection. Once garbage collection completes, no software and no lab can recover that data. If your drive is dead, corrupted, or not detected, power it down & send it for evaluation.
What Should I Do if My Toshiba or Kioxia SSD Is Not Detected?
A Toshiba/Kioxia SSD that doesn't appear in BIOS has a dead controller, a shorted power management IC, or corrupted firmware that prevents initialization. Software tools can't communicate with a drive the system doesn't see. Board-level diagnosis with PC-3000 SSD & FLIR thermal imaging identifies which failure is present.
Before sending the drive, rule out the obvious. These checks take two minutes & cost nothing.
- Check the BIOS/UEFI device list. Reboot, enter BIOS (F2 or Del on most boards), and look under Storage or NVMe Configuration. If the drive shows a model string (even a garbled one like "KXG60ZNV256G" with 0MB capacity), the controller is partially alive. If no device appears, the controller or PMIC is dead.
- Try a different M.2 slot or SATA port. XG & BG series use M.2 M-key (NVMe). BG4/BG5 use M.2 2230 form factor; verify your adapter or slot supports 2230 drives. For SATA models (TR200), try a different SATA cable & port.
- Test in a USB enclosure. A USB-to-NVMe enclosure on another computer isolates whether the issue is the drive or the motherboard. For BG4/BG5 (2230), you need a 2230-compatible enclosure. If the drive isn't detected via USB either, the problem is internal.
- Stop here if the drive isn't detected anywhere. Do not attempt firmware updates or secure erase on an undetected drive. A drive with a dead controller needs board-level repair, not software troubleshooting. Power down the drive & send it for evaluation. Free diagnosis, no obligation.
NVMe Toshiba/Kioxia SSD board repair: $600–$900. SATA board repair: $450–$600. +$100 rush fee to move to the front of the queue.
Toshiba/Kioxia's Two Controller Ecosystems
Toshiba/Kioxia is unusual in the SSD market because they ship drives with two completely different controller families. OEM drives built for laptop manufacturers use Toshiba's in-house TC58NC controllers. Retail drives sold directly to consumers use Phison controllers. This split matters for recovery because each controller family has a different firmware structure, different FTL layout, & different PC-3000 SSD utility module.
TC58NC In-House Controllers (XG & BG Series)
The TC58NC controller family is Toshiba's proprietary NVMe silicon used in the XG5, XG6, XG7, XG8, BG4, & BG5 series. These controllers use a multi-core ARM design with Toshiba's proprietary LDPC ECC engine tuned to their own BiCS NAND voltage distributions. The FTL (Flash Translation Layer) structure in TC58NC controllers differs from every other manufacturer. Toshiba uses a two-level mapping scheme: an L2P (logical to physical) table in DRAM backed by a persistent copy in a reserved NAND area. If the DRAM copy corrupts during power loss, recovery requires loading the persistent backup from NAND & resolving any inconsistencies with the write journal.
Phison Controllers (Exceria & SATA Retail)
Kioxia's retail Exceria line uses off-the-shelf Phison controllers repackaged with Kioxia part numbers. The Exceria Gen3 uses a Phison E12C (marketed as TC58NC1202GST). The Exceria Pro uses a Phison E18. The Exceria G2 uses a Phison E12S. SATA drives (TR200, OCZ TR150) used Phison S11 & S10 controllers. PC-3000 SSD has mature, full-depth support for Phison controllers, making firmware-level recovery on Exceria drives more straightforward than on TC58NC-based XG series drives.
Toshiba/Kioxia SSD Encryption & Chip-Off Limitations
Toshiba/Kioxia NVMe SSDs implement AES-256 hardware encryption, but the implementation differs between the two controller families. XG series OEM drives support TCG Opal 2.0, a full self-encrypting drive (SED) specification designed for enterprise laptop encryption managed by IT departments. The Media Encryption Key is generated by the controller's hardware RNG and stored on the NAND in wrapped form; it is wrapped by a Key Encryption Key derived from silicon-unique fuses or a secure enclave on the TC58NC controller die.
Kioxia Exceria retail drives use Phison's AES-256 implementation, which is controller-bound in the same way. The Phison E12C, E12S, & E18 use a Media Encryption Key generated by the controller's hardware RNG and stored on the NAND in wrapped form, with the unwrap chain rooted in a silicon-unique key on the Phison controller. Even without a user-set password, all data written to the NAND is encrypted. Desoldering BiCS NAND chips from either family yields only ciphertext with no usable key.
In Apple environments, the situation is the same as every other SSD brand. If a Toshiba/Kioxia SSD runs inside an Apple Silicon Mac or T2-equipped Intel Mac, the Secure Enclave enforces always-on AES-256 encryption regardless of FileVault status. A Unique ID is fused into the Secure Enclave during fabrication and acts as the root of trust that wraps the volatile class keys protecting user data. Recovery requires board-level repair of the original logic board so the Secure Enclave can operate normally.
Labs that advertise chip-off recovery for modern NVMe drives are applying a technique designed for unencrypted USB flash & older SD cards. On any Toshiba/Kioxia SSD where the data path depends on the controller's FTL or an encryption layer, board-level repair to revive the original controller is the viable recovery path.
What Is BiCS FLASH NAND & How Does It Affect Recovery?
BiCS FLASH is Toshiba/Kioxia's 3D NAND technology. "BiCS" stands for Bit Cost Scalable, a vertical cell-stacking architecture that Toshiba pioneered alongside Samsung's V-NAND & Micron's 3D NAND. Each BiCS generation increases the number of cell layers stacked on a single die, increasing storage density without shrinking the individual cell dimensions.
| Generation | Layers | Cell Type | Used In |
|---|---|---|---|
| BiCS3 | 64 layers | TLC / QLC | XG5, BG3, TR200 |
| BiCS4 | 96 layers | TLC | XG6, BG4, RC500, Exceria (Gen3), Exceria Plus (Gen3) |
| BiCS5 | 112 layers | TLC | XG7, BG5, Exceria Pro, Exceria Plus (Gen4), Exceria G2 |
| BiCS6 | 162 layers | TLC / QLC | XG8, BG6 |
TLC NAND stores 3 bits per cell by distinguishing between 8 voltage levels. QLC stores 4 bits per cell with 16 voltage levels. As cells wear through program/erase cycles, the voltage margins between levels narrow. Higher layer counts (BiCS5, BiCS6) pack more cells into each die, which increases thermal stress during writes & tightens voltage margins faster.
The controller's LDPC ECC engine compensates for narrowing margins until the error rate exceeds the correction threshold. At that point, reads fail & the controller may mark blocks as bad. PC-3000 SSD hardware read-retry shifts the voltage thresholds to recover data from cells that the controller's standard read can no longer access. BiCS3 (64-layer) cells are more mature & have wider voltage margins; BiCS6 (162-layer) cells are denser with tighter margins, making read-retry calibration more critical for recovery yield.
How Does BiCS FLASH Charge Trap Architecture Affect NAND Degradation?
BiCS FLASH uses charge trap (CT) cell architecture, where electrons are stored in a silicon nitride insulating layer instead of a conductive floating gate. This design affects how BiCS NAND degrades over time & how PC-3000 SSD recovers data from worn cells. CT cells fail differently than floating gate cells, and read-retry calibration must account for those differences.
Charge Trap vs. Floating Gate NAND
- Charge Trap (BiCS FLASH, Samsung V-NAND)
- Electrons are trapped in localized states within a silicon nitride dielectric layer. Because the insulator isn't conductive, a defect in one cell can't drain charge from neighboring cells. This provides resistance to cell-to-cell interference as layer counts increase.
- Floating Gate (Intel/Solidigm 3D NAND, older planar NAND)
- Electrons are stored on a conductive polysilicon gate surrounded by oxide insulation. A pinhole defect in the oxide can drain the entire gate's charge, causing a complete bit flip. Intel used floating gate architecture in its earlier 3D NAND before transitioning to newer designs.
For recovery, the distinction matters because charge trap cells degrade gradually rather than catastrophically. A worn CT cell shifts its threshold voltage over thousands of reads; a worn floating gate cell can lose its entire charge from a single oxide defect. PC-3000 SSD's read-retry approach for BiCS NAND involves fine-grained voltage stepping, not the binary pass/fail pattern seen with floating gate failures.
Read-Disturb Accumulation in High-Layer BiCS
Reading one cell requires applying a pass-through voltage (Vpass) to every unselected wordline in the same NAND string. That Vpass causes microscopic electron injection into neighboring cells. In BiCS5 (112-layer) & BiCS6 (162-layer) NAND, more wordlines share the same silicon nitride channel, which means more cells are exposed to Vpass stress per read operation. After hundreds of thousands of reads without an intervening erase cycle, the threshold voltage of unread cells shifts upward, causing bit errors.
Read-disturb isn't the same as wear. A drive can have low P/E cycle counts and still accumulate read-disturb errors if specific blocks are read-heavy. Database index files, OS swap partitions, & VM page files are common targets. PC-3000 SSD read-retry compensates by shifting reference voltages in millivolt increments to find the optimal sensing point for disturbed cells.
TLC & QLC Endurance Cliff Behavior
TLC distinguishes 8 voltage states using 7 reference voltages. QLC distinguishes 16 voltage states using 15 reference voltages. As program/erase cycles accumulate, the silicon oxide surrounding each charge trap degrades, trapping permanent residual charge. The 8 or 16 voltage distributions widen & begin overlapping.
The controller's LDPC ECC engine corrects errors until the raw bit error rate (RBER) exceeds the correction threshold. This creates a cliff: the drive operates without apparent issues, then the controller locks it into read-only mode or a BSY state when RBER crosses the LDPC limit. There is no gradual slowdown; it's functional one day & locked the next.
BiCS3 (64-layer) TLC cells have wider voltage margins between states, allowing more P/E cycles before the cliff. BiCS6 (162-layer) TLC packs cells closer together with tighter margins. QLC is worse: 15 reference voltages leave less room for distribution widening than TLC's 7. When a drive hits the endurance cliff, PC-3000 SSD hardware read-retry shifts each reference voltage independently, searching for the millivolt window where the original 8 or 16 distributions are still distinguishable.
Which Third-Party SSDs Use Kioxia BiCS NAND?
Kioxia BiCS NAND appears in SSDs from other manufacturers, not just Kioxia-branded drives. If your Kingston, Sabrent, or budget SSD uses BiCS FLASH internally, the NAND degradation patterns described above apply. But the recovery procedure follows the controller family, not the NAND supplier.
The latest Kioxia Exceria Pro G2 (4TB) pairs an SM2508 Silicon Motion 8-channel PCIe Gen5 controller with BiCS8 218-layer NAND. BiCS8 uses CBA (CMOS directly Bonded to Array) architecture, where the logic circuitry is manufactured separately & bonded directly to the NAND array. Recovery on this drive uses the PC-3000 Silicon Motion utility, not the Toshiba/Kioxia OEM path.
Kioxia's Exceria Plus G4 uses a Phison E31T DRAM-less 4-channel PCIe Gen5 controller. Third-party budget SSDs pairing Kioxia BiCS NAND with Maxio MAP1602 or InnoGrit controllers were implicated in Windows 11 24H2 crash loops, producing BSOD screens & "No bootable device" errors. The NAND itself isn't the cause; the controller firmware's interaction with the Windows 24H2 storage driver triggers the failure.
A Kingston SSD with Kioxia BiCS NAND & a Phison E12 controller uses the same PC-3000 Phison utility as a Kioxia Exceria. The NAND brand affects read-retry voltage calibration because BiCS charge trap cells have different degradation profiles than Samsung V-NAND or Micron 3D NAND. But the firmware-level recovery path, FTL structure, & encryption implementation are all controller-determined. NVMe firmware recovery: $900–$1,200. SATA firmware recovery: $600–$900.
PC-3000 SSD Recovery for Toshiba & Kioxia Controllers
ACE Lab's PC-3000 SSD supports Toshiba/Kioxia drives through two paths: the Phison utility modules for Exceria/SATA retail drives, and NVMe vendor-specific command access for TC58NC-based OEM drives. Support depth varies by controller generation.
Phison-Based Drives: Full Recovery Suite
Kioxia Exceria (E12C), TR200 (S11), & OCZ drives (S10) use Phison controllers with mature PC-3000 SSD support. The Phison NVMe & SATA utility modules provide firmware-level access: FTL reconstruction, bad block management, firmware module repair, & virtual translator extraction. These are the same Phison tools used for Kingston, Sabrent, Corsair, & dozens of other brands that share Phison silicon. Firmware recovery: $600–$900 (SATA), $900–$1,200 (NVMe).
The Exceria Pro (E18) has limited PC-3000 support. ACELAB classifies the PS5018-E18 as repair-only, meaning firmware-level FTL reconstruction for data extraction is not currently available. Recovery on E18-based drives relies on component-level board repair to restore the controller to operational status for imaging through the native decryption path. Board repair: $600–$900.
TC58NC OEM Drives: Board Repair + Imaging
The XG5, XG6, XG7, XG8, BG4, & BG5 use Toshiba's proprietary TC58NC controllers. These proprietary OEM controllers lack the deep PC-3000 utility modules available for Phison or Silicon Motion silicon. Recovery on TC58NC drives relies on component-level electrical repair: tracing PMICs, load switches, & TVS diodes to restore the controller's power rails & get it to a functional state for imaging through the native decryption path. NVMe board repair: $600–$900.
Recovery Limitations
TC58NC controllers are less widely deployed than Phison or Samsung silicon, so reverse-engineering depth is limited across the entire data recovery industry. ACE Lab continues expanding TC58NC support with each PC-3000 update. When firmware-level tools are limited, the recovery vector shifts to electrical board repair: identifying & replacing failed passive components to restore the controller to operational status. If a recovery requires deeper firmware access than current tooling provides, we tell you that during the free evaluation.
Toshiba & Kioxia SSD Product Line Reference
Toshiba/Kioxia's product lineup spans legacy Toshiba-branded SATA & NVMe drives, current Kioxia-branded consumer & enterprise drives, and OEM models found in major laptop brands. Each uses a different controller & NAND generation with different failure modes.
| Model | Interface | Controller | NAND | Common Failure |
|---|---|---|---|---|
| XG5 (KXG50ZNV) | NVMe PCIe 3.0 x4 | TC58NC (proprietary) | BiCS3 64L TLC | FTL corruption after power loss |
| XG6 (KXG60ZNV) | NVMe PCIe 3.0 x4 | TC58NC (proprietary) | BiCS4 96L TLC | FTL corruption; 0MB capacity in BIOS |
| XG7 (KXG70ZNV) | NVMe PCIe 4.0 x4 | TC58NC (updated) | BiCS5 112L TLC | ASPM sleep/resume firmware corruption |
| XG8 (KXG80ZNV) | NVMe PCIe 4.0 x4 | TC58NC (updated) | BiCS6 162L TLC | Power state transition failures |
| BG4 (KBG40ZNS) | NVMe PCIe 3.0 x4 (2230 BGA) | TC58NC (BGA SSD) | BiCS4 96L TLC | BGA thermal failure; solder fatigue |
| BG5 (KBG50ZNS) | NVMe PCIe 4.0 x4 (2230 BGA) | TC58NC (BGA SSD) | BiCS5 112L TLC | BGA thermal failure; NVMe bus drop |
| RC500 | NVMe PCIe 3.0 x4 | TC58NC1202GST (=E12C) | BiCS4 96L TLC | Phison E12C firmware hang |
| Exceria (Gen3) | NVMe PCIe 3.0 x4 | Phison E12C | BiCS4 96L TLC | Firmware hang; 0MB safe mode |
| Exceria Pro | NVMe PCIe 4.0 x4 | Phison E18 | BiCS5 112L TLC | PMIC failure; voltage spike death |
| Exceria G2 | NVMe PCIe 3.0 x4 | Phison E12S | BiCS5 112L TLC | Firmware corruption; controller hang |
| TR200 | SATA III (2.5") | Phison S11 | BiCS3 64L TLC | SATAFIRM S11 firmware bug |
| OCZ TR150 | SATA III (2.5") | Phison S10 | 15nm TLC (planar) | Controller death; firmware corruption |
| CM6 (Enterprise) | NVMe PCIe 4.0 x4 (U.2/U.3) | Kioxia custom | BiCS4/BiCS5 TLC | PLP capacitor failure; custom firmware |
| CD8 (Enterprise) | NVMe PCIe 5.0 x4 | Kioxia custom | BiCS6 162L TLC | Custom controller; limited tooling |
Enterprise & BGA Recovery Workflows by Drive Family
Workflow diverges by form factor & target market. Ultrabook BGA SSDs, U.2/U.3 enterprise drives, & hyperscale data-center models each present different board-repair surfaces & different PC-3000 SSD access paths. What follows is the recovery approach we take per drive family.
BG3 (KBG30ZPZ) Early BGA NVMe
The BG3 was an early-generation single-package BGA NVMe drive from Toshiba, shipped in Lenovo ThinkPad X1 Carbon gen 6, HP EliteBook, & low-profile laptops either as a direct-solder 16mm x 20mm BGA package or as an M.2 2230 removable module that carries the same BGA. It uses a proprietary Toshiba PCIe NVMe controller paired with BiCS3 64-layer TLC. Common failure: controller VCC rail collapse after extended thermal cycling, producing "no drive detected" at BIOS post. Recovery requires FLIR thermal imaging to isolate which substrate-internal rail has shorted, followed by substrate via repair or controller reball with Zhuo Mao BGA rework. Because the BG3 shares a substrate with the NAND, a shorted controller can pull the NAND VCC rail low & make the drive appear fully dead when only the controller side is at fault. NVMe board repair: $600–$900.
CM6 & CM7 Enterprise U.2/U.3 NVMe
The CM6 (PCIe 4.0 x4, U.2 2.5" 15mm) & CM7 (PCIe 5.0 x4, U.3 2.5") are Kioxia's mainstream enterprise NVMe drives. Both use Kioxia's proprietary enterprise controller silicon, not Phison or Marvell. The CM6 pairs with BiCS4 96L or BiCS5 112L TLC depending on capacity point; the CM7 uses BiCS5 112L or BiCS6 162L. Both carry Power-Loss Protection (PLP) tantalum capacitor banks & end-to-end data protection with T10 PI (DIF/DIX).
Dominant failure mode in the field: PLP capacitor bank degradation. Tantalum caps lose capacitance under sustained thermal load in a hot storage chassis. When the PLP bank fails its self-test at boot, the firmware refuses to admit the drive as ready & the drive never enumerates on the PCIe bus. Recovery uses a thermal scan with FLIR to identify the failed cap, rework the cap array, & re-trigger the PLP self-test. If the controller itself has failed (a separate, rarer mode), PC-3000 SSD support for Kioxia's enterprise silicon is limited; depth varies by ACE Lab update cycle. U.3 drives add a further wrinkle: the tri-mode backplane negotiates SAS, SATA, & NVMe on the same connector, & a marginal signal integrity issue on the host side can present as a drive fault. We test out-of-chassis on a known-good U.2/U.3 adapter before touching the drive electrically. NVMe board repair: $600–$900. Firmware-level work (when tooling permits): $900–$1,200.
CD6 & CD7 Data-Center NVMe (Hyperscale)
The CD6 (PCIe 4.0 x4, U.2) & CD7 (PCIe 5.0 x4, EDSFF E3.S) target hyperscale data-center deployments. Both use Kioxia enterprise controllers with BiCS5 or BiCS6 TLC & heavy over-provisioning for sustained write workloads. The E3.S ruler-style chassis run hotter than traditional U.2 bays, which accelerates PLP capacitor aging & NAND retention-period compression. (The E1.S form factor in Kioxia's hyperscale line is handled by the XD6 series, not CD7.) Field-failure presentation is similar to CM-series: drive absent from PCIe enumeration, or drive enumerates but reports read-only. EDSFF recovery requires an EDSFF-to-U.2 breakout board for bench imaging before any board repair decision. On a read-only CD6/CD7, we image first through the native path at whatever read bandwidth the drive still tolerates, then decide whether controller reball or PLP bank replacement is justified by what's missing from the image. NVMe board repair: $600–$900. Firmware recovery: $900–$1,200.
Why Chip-Off Recovery Fails on Modern Kioxia NAND
Customers sometimes ask why we don't "just desolder the NAND & read it on a NAND reader." The architecture of current BiCS generations is the answer. Early 3D NAND through BiCS5 (112-layer) placed the peripheral CMOS circuitry adjacent to the memory array on the same die (CNA, CMOS Next to Array). Starting with BiCS6 (162-layer), peripheral logic moved beneath the array (CUA, CMOS Under Array) to increase density. BiCS8 takes this further: Kioxia fabricates the logic circuitry and memory array on separate wafers and bonds them together (CBA, CMOS directly Bonded to Array). In every modern generation, the NAND die you would desolder is only half of the working storage device.
Even if a chip-off yields clean page dumps, the data is AES-256 ciphertext permutated by controller-resident FTL metadata, XOR-scrambled by a controller-specific seed, LDPC-encoded with controller-specific code rates, & (on SED drives) keyed to the controller's security silicon. Reassembling plaintext from raw NAND dumps without the original controller is computationally intractable for production drives. This is why board-level repair to revive the original controller is the correct recovery path for encrypted Kioxia SSDs, not chip-off. Chip-off remains viable only on legacy planar SLC/MLC devices & on a small subset of un-encrypted consumer SATA drives.
Kioxia NVMe Panic Signatures and PC-3000 Portable III Tech Mode
A dead Kioxia NVMe drive announces itself in kernel logs & Event Viewer with a specific set of fault signatures. Reading those signatures correctly is the first step that decides whether the drive is a Tech Mode firmware job, a board-level rail repair, or a controller-die loss that no recovery path can reach. The procedure below sits inside the broader SSD data recovery overview & applies to TC58NCxxxx-based drives across the XG, BG, & CM lines.
Host-visible panic signatures on Kioxia NVMe drives
When a TC58NC controller in an XG8 KXG80ZNV, BG5 KBG50ZNS, or CM6 panics on boot, the host stack reports it in a small number of recognizable ways. The NVMe spec bit CSTS.CFS (Controller Fatal Status) goes high & stays high; CSTS.RDY never asserts after CC.EN is set, so the controller never completes the NVMe Identify handshake. Capacity reads as 0 bytes. Namespace ID 1 is missing or returns a malformed Identify Namespace structure. In the worst presentation, the drive reports its raw silicon ID (something like TC58NC1202GST) instead of the model string, because firmware never loaded the model-name table out of the system area. PCIe LTSSM training falls back to Gen.1 x1 or fails outright, & the kernel logs the device removal.
A representative dmesg excerpt from a Kioxia BG-series panic looks like this:
nvme nvme0: pci function
nvme nvme0: PCIe Gen.1 x1 link up
nvme nvme0: Device not ready; aborting reset, CSTS=0x1
nvme nvme0: controller is down; will reset: CSTS=0xffffffff
nvme nvme0: failed to set APST feature (-19)
nvme nvme0: Removing after probe failure status: -19
AMD-Vi: Event logged [IO_PAGE_FAULT domain=0x000a address=0x0 flags=0x0050]
blk_update_request: I/O error, dev nvme0n1, sector 0
Buffer I/O error on dev nvme0n1, logical block 0, async page readThese signatures mean the controller is alive enough to advertise on PCIe but cannot load a usable FTL. That is firmware-level damage, not chip damage. The recovery path is loader injection through PC-3000 Tech Mode, not chip-off.
PC-3000 Portable III NVMe Tech Mode entry workflow for Kioxia controllers
The desktop PC-3000 SSD rig handles routine Kioxia firmware work, but a panicking NVMe drive that pulls the host PCIe bus down on every probe needs the Portable III. The Portable III is an external PCIe root complex; it isolates the workstation from drive panic, lets the operator manipulate link state & NVMe timeouts at the bus level, & intercepts the boot sequence without bluescreening the host. For a drive that triggers IO_PAGE_FAULT during s2idle on a desktop, that isolation is the difference between a recovery attempt & a frozen workstation.
Adapter selection follows the form factor. M.2 PCIe NVMe adapters cover XG6, XG7, & XG8 client & data-center M.2 drives. U.2 / U.3 adapters cover CM6 & CM7 enterprise drives. BG4 & BG5 surface-mount BGA modules need either a soldered BGA bridge or a BGA socket adapter, because the drive was never meant to leave the host PCB. Once the drive is on the right adapter, the operator forces ROM / SAFE / BOOT mode by shorting the corresponding test pads on the TC58NC PCB during power-on reset; the controller halts firmware boot & sits idle waiting for a loader push.
From there, the PC-3000 utility loads the controller-specific resource group for the underlying silicon & pushes a micro-loader (LDR) over PCIe into the controller's SRAM. The loader initializes the NAND interface & ECC engines without touching the corrupted FTL. PC-3000 then reads surviving FTL metadata pages & assembles a virtual translator in workstation RAM. Critically, the drive's hardware AES-256 engine is still decrypting each page on the fly, because the original controller silicon is doing the read; PC-3000 is bypassing the broken FTL, not the encryption. This is the mechanism that distinguishes firmware-level recovery from chip-off & the reason chip-off cannot reach the same data. Firmware-level work pricing: $900–$1,200.
Why board-level VCC/VREG repair is a hard prerequisite for decryption
Tech Mode only works if the controller silicon will boot. On a TC58NC controller, the Media Encryption Key (MEK) is generated by the controller's hardware RNG and stored on the NAND in wrapped form; it is wrapped by a Key Encryption Key derived from silicon-unique fuses or a secure enclave on the controller die. The NAND is ciphertext under the MEK, & the unwrap chain depends on a root key bound to that specific silicon. Chip-off yields ciphertext only. So every recovery path, including loader injection, starts with one prerequisite: the original controller has to power up cleanly. For the broader picture, see hardware-encrypted SSD recovery.
The TC58NC controller depends on three rails. VCC core (0.9-1.2V, high current) feeds the ARM cores & logic. VCCQ (1.2V or 1.8V) feeds the DRAM & NAND interface. VPP (~2.5V externally, internally boosted toward 12V) feeds the charge-trap program /erase pumps inside the NAND. Common failure modes are a shorted MLCC on VCCQ, a dead PMIC, & a blown LDO. Diagnosis is a FLIR thermal scan to localize the hotspot after a controlled current-limited power-on. A shorted 0402 on VCCQ shows up within seconds as a bright spot on the thermal image.
Repair work uses a Hakko FM-2032 on an FM-203 base for fine-pitch passives & LDOs, an Atten 862 hot air rework station for larger packages, & a Zhuo Mao precision BGA rework station when a PMIC or a controller-adjacent BGA must come off without disturbing underfilled NAND. NVMe board-level repair pricing: $600–$900.
The decision tree has one terminal node. If VCC core measures a hard short (drain to ground under 1 ohm) & the short does not move when surrounding passives are lifted, the controller die itself is internally fused. The silicon-bound root key that unwraps the MEK is trapped in that dead die. Because chip-off on the surviving NAND only yields ciphertext, the drive is technically unrecoverable at that point. We say so before quoting; we do not bill for recovery attempts that the physics has already ruled out.
Toshiba & Kioxia SSD Recovery FAQ
How much does Toshiba or Kioxia SSD data recovery cost?
Toshiba/Kioxia SATA SSD recovery starts at $200 for a simple copy and ranges up to $1,200–$1,500 for NAND swap. NVMe recovery (XG5, XG6, XG7, Exceria) starts at $200 and ranges up to $1,200–$2,500. Free evaluation. No data recovered means no charge. +$100 rush fee to move to the front of the queue.
What is the difference between Toshiba and Kioxia SSDs?
Kioxia is the former Toshiba Memory Corporation. Toshiba sold its memory division to a Bain Capital consortium in 2018, and the company rebranded to Kioxia in October 2019. Drives sold before the rebrand carry the Toshiba name (XG5, XG6, RC500, TR200). Drives sold after carry the Kioxia name (Exceria, Exceria Plus, Exceria Pro, XG7, XG8, BG5). The NAND technology (BiCS FLASH) and many controller designs are continuous across both brands. We recover all Toshiba-branded and Kioxia-branded SSDs.
Can recovery software fix a Toshiba or Kioxia SSD?
Recovery software like Disk Drill, EaseUS, or R-Studio works when the SSD is physically healthy and the issue is logical: accidental deletion (with TRIM disabled), partition corruption, or a formatted volume. Software can't fix a dead controller, corrupted firmware, or degraded NAND. Running software scans on a failing drive stresses degrading BiCS NAND cells and may trigger garbage collection that permanently erases data. Power down the drive and send it for professional evaluation.
Why is chip-off recovery limited on Toshiba/Kioxia NVMe SSDs?
Toshiba/Kioxia NVMe SSDs use AES-256 hardware encryption. The XG series OEM drives support TCG Opal 2.0, with the encryption key bound to the controller silicon. Kioxia Exceria drives use Phison controllers with their own AES-256 implementation. In both cases, desoldering BiCS NAND chips yields only ciphertext. Board-level repair to revive the original controller is the only recovery path for encrypted drives.
Can you recover data from a Toshiba XG5 or XG6 OEM SSD?
Yes. The XG5 and XG6 are Toshiba/Kioxia's OEM NVMe drives found in Dell, HP, and Lenovo laptops. They use Toshiba's proprietary TC58NC-series controllers with BiCS3 (XG5) or BiCS4 (XG6) NAND. Because these proprietary controllers lack deep firmware utility modules, recovery requires component-level board repair to revive the original controller for imaging through the native decryption path. These drives are among the most common Toshiba SSDs we recover due to their widespread OEM deployment.
What should I do if my Toshiba/Kioxia SSD is not detected in BIOS?
A Toshiba/Kioxia SSD invisible to BIOS has a dead controller, a shorted power management component, or corrupted firmware preventing initialization. Try a different M.2 slot first, then test in a USB-to-NVMe enclosure on another computer. If the drive isn't detected anywhere, the failure is internal. Do not attempt firmware updates on an undetected drive. Power it down and send it for professional evaluation. NVMe board repair: $600–$900. SATA board repair: $450–$600. Free diagnosis, no obligation.
How long does Toshiba/Kioxia SSD data recovery take?
Recovery timelines depend on the failure type. Simple data copies take 3-5 business days. File system recovery and firmware repairs take 2-4 weeks. Board-level circuit repair takes 3-6 weeks. NAND swap cases requiring microsoldering take 4-8 weeks. +$100 rush fee to move to the front of the queue to move to the front of the queue. We provide a firm quote and timeline estimate after the free evaluation.
What Toshiba and Kioxia SSD models do you recover?
We recover all Toshiba-branded SSDs (XG5, XG6, BG3, BG4, RC500, RC100, TR200, OCZ TR150) and all Kioxia-branded SSDs (XG7, XG8, BG5, BG6, Exceria, Exceria Plus, Exceria Pro, Exceria G2). We also recover Kioxia enterprise SSDs including the CM6, CM7, CD8, and PM7 series. Each model uses a different controller (Toshiba TC58NC in-house or Phison) with different recovery procedures.
Can you recover a BG4 or BG5 BGA SSD from an ultrabook?
Yes. The BG4 (KBG40ZNS) and BG5 (KBG50ZNS) are single-package BGA SSDs that combine the controller, NAND, and DRAM into one soldered package. They're used in ultrabooks, Microsoft Surface devices, and compact laptops. The BGA form factor makes board repair more complex because all components share one substrate. If the BGA package has a shorted PMIC, we use FLIR thermal imaging to localize the fault and Zhuo Mao BGA rework to address the connection failure.
Why does my Lenovo ThinkPad show a 2100 or 2102 detection error with a Kioxia SSD?
The 2100/2102 error is a known firmware panic affecting Kioxia BG4 and BG5 NVMe drives in Lenovo ThinkPads. The failure was triggered by Linux/Ubuntu installations on firmware version 1106ANLA or earlier. Lenovo issued firmware update 1107ANLA to prevent it, but drives that already panicked are bricked. The BG4/BG5 are monolithic BGA packages; recovery requires board-level diagnosis with PC-3000 SSD. NVMe board repair: $600–$900. Free evaluation.
Do third-party SSDs that use Kioxia BiCS NAND need the same recovery procedure?
The recovery procedure follows the controller, not the NAND manufacturer. A Kingston, Sabrent, or Corsair SSD using Kioxia BiCS NAND with a Phison controller uses the same PC-3000 Phison utility as a Kioxia Exceria. The NAND brand affects read-retry voltage calibration because BiCS charge trap cells have different degradation curves than Samsung V-NAND or Micron 3D NAND. But the firmware-level recovery path is determined by the controller family.
Toshiba or Kioxia SSD not detected, locked, or showing 0 bytes?
Free evaluation. NVMe recovery from From $200. SATA recovery from From $200. No data, no fee.
