Update (July 7, 2021)
The Design Automation team developed a fix for this security vulnerability and, therefore, has reenabled Spooler. Applications should be working as before.
Original post (July 2, 2021)
The Spooler (spoolsv.exe), a Windows program that manages print jobs, was enabled in order to support XPS printing on Design Automation for Revit. Microsoft recently published the vulnerability CVE-2021-1675 that could potentially affect instances, and a potential exploit went public this week.
The Design Automation service, following security recommendations, decided to disable the spoolsv.exe process, effective immediately. All Design Automation instances disabled spoolsv.exe and any Workitem with XPS printing may now fail to complete with the following message:
Error: There has been an error printing the XPS file. Autodesk.Revit.Proxy.Exceptions.InvalidOperationExceptionProxy: Failed to access print parameters.
We will continue to track this issue and will apply the Microsoft patch to re-enable the Spooler service pending its release.
Other engines always had Spooler disabled, therefore they remain unaffected.
If you have any questions, please contact the Forge Support team.