The acquisition of a TeamViewer session documented on GitHub was performed on Windows 10. However, according to The Hacker News, you have to place code via DLL Injector in TeamViewer.exe, which is possible if you have access to the respective computer.
As mentioned, the gap was discovered or tried on Windows 10, but it is not directly related to the operating system and also exists on macOS and Linux. The vulnerability was tested with TeamViewer version 13.0.5058 for Windows.The provider of the software has already closed them and provided a patch, in the current version 13.0.5640 such a reversal of the remote access is no longer possible.
TeamViewer recommends that you install the patched software immediately if you do it manually. If you have configured TeamViewer for automatic updates, you usually do not need to initiate the download, just follow the instructions on the screen. But there is no reason to worry. Because the gap is certainly serious, but also requires special circumstances and was quickly stuffed by TeamViewer.