i had the same issue, the solution that worked for me recently is by adding
monitor_control.restrict_backdoor = "TRUE"
monitor_control.disable_directexec = "TRUE"
to the .vmx file, the first line restricts the use of the "backdoor" communication channel that vmware uses to allow the guest OS to communicate directly with the hypervisor for certain operations and force the guest to use more traditional methods for communication.
the second line which disables direct execution forces vmware to use binary translation for all guest instructions these settings may ( and will ) lower the performance but who cares it worked especially if you interact with the machine through ssh.