Vmware Player Could Not Find Component On Update Server



Now I can never install/update vmware tools in my vmware machine. If I click on the menu 'Reinstall vmware tools' or click on the pop up at the bottom 'update vmware tools' I only get this message ' Could not find component on update server. Contact VMware Support or your system administrator.' I have tried reinstalled Vmware player 4.0.2 but. Could not find component on update server. Contact VMware Support or your system administrator. Google has no answers. Its obviously a strange fault.

VMware vSphere also affected by multiple vulnerabilities since its uses Intel/AMD platforms. VMware vSphere has multiple layers of virtualization and sadly, you should apply/update the patches for all the components which includes Operating systems, virtual machines, virtual appliances, hypervisors, server firmware, and CPU microcode. Operating system patches can reduce the risk with help of hypervisor patches without updating the server firmware (CPU microcode update) but it would be more secure if you update the hardware firmware as along with Hypervisor update and VM guest patching (Linux/Windows).

Here is the list of three discovered Meltdown and Spectre variants:

  • Variant 1: bounds check bypass (CVE-2017-5753) – a.k.a. Spectre
  • Variant 2: branch target injection (CVE-2017-5715) – a.k.a. Spectre
  • Variant 3: rogue data cache load (CVE-2017-5754) – a.k.a. Meltdown

VMware classifies the mitigation in the below listed category.

  • Hypervisor-Specific Mitigation
  • Hypervisor-Assisted Guest Mitigation
  • Operating System-Specific Mitigations

You must know about all the three different type mitigation before applying the patches since it could lead to performance issues.

May 15, 2019 The server is a VM running on VMWare ESXi 6.5 Update 1 and is a fresh install off the volume licensing ISO with nothing other than VMWare Tools 10.1.7 installed on it. The only thing not 'typical' about this build is that Windows Updates is going through a proxy server (which works fine for updating Windows Server 2012 R2). VMware vSphere also affected by multiple vulnerabilities since its uses Intel/AMD platforms. VMware vSphere has multiple layers of virtualization and sadly, you should apply/update the patches for all the components which includes Operating systems, virtual machines, virtual appliances, hypervisors, server firmware, and CPU microcode. Operating system patches can reduce the risk with help of. Once you try to drag and drop files from your host machine on which a VMware Workstation, VMware Player or VMware Fusion is installed, you will see the accessibility access warning: “vmware-tools-daemon” would like to control this computer using accessibility features. Hit the Open System Preferences button to edit settings.

Hypervisor-Specific Mitigation:

Vmware player could not find component on update server error

VMware Hypervisor is affected by Spectre – variant 1 & Variant 2. Meltdown doesn’t affect VMware vShpere hypervisor but guest require patches for both Spectre & Meltdown Vulnerabilities.

Hypervisor-Assisted Guest Mitigation

It virtualizes the new speculative-execution control mechanism for guest VMs so that a Guest OS can mitigate leakage between processes within the VM. This mitigation requires that specific microcode patches that provide the mechanism are already applied to a system’s processor(s) either by ESXi or by a firmware/BIOS update from the system vendor.

Operating System-Specific Mitigation:

Mitigation for Operating Systems are provided by respective OS Vendors. If you have virtual appliances, virtual appliance vendor will need to integrate these into their appliances and provide an updated appliance.

Vmware Player Could Not Find Component On Update Server Permissions

VMware Products which are affected by Spectre:

  • VMware vSphere ESXi (ESXi)
  • VMware Workstation Pro / Player (Workstation)
  • VMware Fusion Pro / Fusion (Fusion)
  • VMware vCenter Server (VC)

Hypervisor-Specific Mitigation:

VMware ProductProduct VersionApply PatchMitigation/ Workaround
ESXi6.5ESXi650-201712101-SGNone
ESXi6ESXi600-201711101-SGNone
ESXi5.5ESXi550-201709101-SG*None
Workstation14Not AffectedNone
Workstation1212.5.8None
Fusion10xNot AffectedNone
Fusion8x8.5.9None

* This patch mitigates CVE-2017-5715 but not CVE-2017-5753.

Vmware Player Could Not Find Component On Update Server Windows 10

Hypervisor-Assisted Guest Remediation:

(Not Recommended by VMware due to microcode issue. )

To remediate CVE-2017-5715 in the Guest OS, the following VMware and third-party requirements must be met:

VMware Requirements

  • Deploy the updated version of vCenter Server listed in the table (if vCenter Server is used).
  • Deploy the ESXi patches and/or the new versions for Workstation or Fusion listed in the table.
  • Ensure that your VMs are using Hardware Version 9 or higher. For best performance, Hardware Version 11 or higher is recommended. VMware Knowledge Base article 1010675 discusses Hardware Versions.

Third party Requirements

  • Deploy the Guest OS patches for CVE-2017-5715. These patches are to be obtained from your OS vendor.
  • Update the CPU microcode. Additional microcode is needed for your CPU to be able to expose the new MSRs that are used by the patched Guest OS. This microcode should be available from your hardware platform vendor.
    VMware is providing several versions of the required microcode from Intel and AMD through ESXi patches listed in the table. See VMware Knowledge Base 52085 for more details.
Vmware Player Could Not Find Component On Update Server
VMware ProductProduct VersionApply PatchMitigation/ Workaround
vCenter6.56.5 U1e*None
vCenter66.0 U3d*None
vCenter5.55.5 U3g*None
ESXi6.5ESXi650-201801401-BGESXi650-201801402-BG**None
ESXi6ESXi600-201801401-BG ESXi600-201801402-BG**None
ESXi5.5ESXi550-201801401-BG**None

“Intel has notified VMware of recent sightings that may affect some of the initial microcode patches that provide the speculative execution control mechanism for a number of Intel Haswell and Broadwell processors. The issue can occur when the speculative execution control is actually used within a virtual machine by a patched OS. At this point, it has been recommended that VMware remove exposure of the speculative-execution mechanism to virtual machines on ESXi hosts using the affected Intel processors until Intel provides new microcode at a later date.

Affected VMware Virtual Appliances : (VMware KB)

Vmware Player 16 Could Not Find Component On Update Server

Vmware Player Could Not Find Component On Update Server

Vmware Player Could Not Find Component On Update Server Unavailable

  • VMware Identity Manager (Workaround KB 52284)
  • VMware vCenter Server 6.5 (Workaround KB 52312)
  • VMware vCenter Server 6.0 (Workaround KB 52312)
  • VMware vSphere Integrated Containers
  • VMware vRealize Automation

Unaffected Virtual Appliances : (VMware KB)

  • vCloud Availability for vCloud Director
  • VMware Horizon DaaS Platform
  • VMware Integrated OpenStack
  • VMware Mirage
  • VMware NSX for vSphere
  • VMware NSX-T
  • VMware Skyline Appliance
  • VMware Unified Access Gateway
  • VMware vCenter Server 5.5
  • VMware vRealize Log Insight
  • VMware vRealize Network Insight
  • VMware vRealize Operations
  • VMware vRealize Orchestrator
  • VMware vSphere Replication
  • VMware Workspace Portal

Performance issue:

Vmware Player Could Not Find Component On Update Servers

VMware is closely working with performance team to evaluate the patch testing to check performance costs of the Meltdown/Spectre mitigation for vSphere. Please check this VMware KB article on regular basis to know more on this.