From my experience with AV vendors and POCs, the new method is not detected/blocked until it becomes prevalent in the wild. So, even if such rare attacks appeared in the wild, the AV vendors added the malware signature without behavioral detection/block of the method.
Currently, the prevalent and well-known method is BYOVD (Bring Your Own Vulnerable Driver). For that method, Avast implemented the vulnerable driver BlockList.
My concern (so far) is not the "AV challenge", but the undetected UAC bypass commonly used in the wild. But, I cannot blame Avast, because even with this possible issue it can compete with top AVs when protecting home users.