The firmware which you flashed to your drive is cryptographically signed. If there was any corruption with the firmware flash, your drive would boot into a very limited recovery mode. That is not what happened to you. Remember, re-flashing the firmware did not fix anything that power cycling couldn't. Your drive is still running the exact same code as it was before you re-flashed it with the same MK firmware binary.
You need to think of your drive as essentially being a very small, low power computer running its own software stack or firmware. It is entirely possible that there are no significant issues in the firmware code. But just like a desktop computer overclocked beyond the point of stability, transient power supply issues can lead to problems and unexpected behaviour in otherwise stable code.
This is most likely what happened with your drive. It is effectively the same as running a stress test like Prime95 or Furmark on a barely stable overclock and observing a crash in Microsoft Outlook. Restarting the computer will address the issue and allow Outlook to function normally. Improving the stability by bolstering the power supply will reduce the likelihood of a repeat incident.
So if you must categorise your issue, I'd call it a temporary glitch caused by insufficient power supply.
To backup UHD discs, MakeMKV uploads a small 'blob' of code to your drives volatile memory. This is what I referred to as the LibreDrive microcode earlier.
The MakeMKV software which runs on your Linux/Mac/Windows computer can interact with this microcode to perform several functions, such as reading the AACS volume ID (VID) or preventing the drive from performing bus encryption.
This microcode based approach has been strict requirement for AACS2 (UHD) discs but it has not been mandated for AACS1 (regular BD) disc decryption as there has always been an abundance of AACS1 host certificate/keys. This may be why you never noticed such quirks in the past when backing up standard BD discs as even when LibreDrive is unavailable the native AACS fallback path is usable.
The overall stability of the microcode approach doesn't quite match that of native AACS authentication, but it is worth it to be functionally immune from AACS host certificate revocation.