Any method that blocks macros (also my DocumentsAntiExploit tool) can prevent that attack.
I repeated the test with an enabled Internet connection (I am not sure If VirusScope uses a cloud backend):
Viruscope could not block the containment bypass, but it has some chances to mitigate some malicious actions of the payload. In my test, I used an unknown but benign payload "New GUI". I initially disabled the Internet connections to be sure that Comodo could not add the file to the trusted group.
I used hardened
@cruelsister settings (all Script Analysis settings enabled).
Comodo on reasonable settings
cannot contain such attacks, but Comodo can detect the payload by signatures or some malicious actions can be blocked by VirusScope/HIPS.
The attack can be contained using a virtual desktop to open the weaponized document.